CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:H/Au:N/C:P/I:P/A:P
EPSS
Percentile
99.8%
The Mozilla layout engine contains multiple memory corruption vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, or create a denial of service condition.
The Mozilla Foundation supports several Open Source projects, including the Mozilla, Seamonkey, and Firefox web browsers. The Thunderbird email client is also a Mozilla product. These products use the Mozilla layout engine to render HTML formatted text.
The Mozilla layout engine contains multiple vulnerabilities. An attacker may be able to exploit these vulnerabilties by convincing a user to connect to a specially crafted website or viewing an HTML formatted email. For more information refer to Mozilla Foundation Security Advisory 2007-01.
A remote, unauthenticated attacker may be able to execute arbitrary code or create a denial of service condition.
Upgrade
See Mozilla Foundation Security Advisory 2007-01 for information about affected clients.
View email in plain text
Configuring Thunderbird to display email in plain text may partially mitigate this vulnerability.
761756
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: February 26, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://www.mozilla.org/security/announce/2007/mfsa2007-01.html> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23761756 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Mozilla credits Jesse Ruderman, Martijn Wargers and Olli Pettay for reporting this vulnerability.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2007-0775 |
---|---|
Severity Metric: | 2.84 Date Public: |
en.wikipedia.org/wiki/Layout_engine
kb.mozillazine.org/Plain_text_e-mail_-_Thunderbird
secunia.com/advisories/24252/
secunia.com/advisories/24293/
secunia.com/advisories/24320/
secunia.com/advisories/24327/
secunia.com/advisories/24328/
secunia.com/advisories/24333/
secunia.com/advisories/24343/
secunia.com/advisories/24352/
secunia.com/advisories/24389/
secunia.com/advisories/24393/
secunia.com/advisories/24406/
secunia.com/advisories/24410/
secunia.com/advisories/24432/
secunia.com/advisories/24455/
secunia.com/advisories/24456/
secunia.com/advisories/24457/
www.ciac.org/ciac/bulletins/r-164.shtml
www.mozilla.com/en-US/
www.mozilla.com/en-US/thunderbird/
www.mozilla.org/products/mozilla1.x/
www.mozilla.org/projects/seamonkey/
www.mozilla.org/security/announce/2007/mfsa2007-01.html