Lucene search

K
cveRedhatCVE-2009-0773
HistoryMar 05, 2009 - 2:30 a.m.

CVE-2009-0773

2009-03-0502:30:00
CWE-399
redhat
web.nvd.nist.gov
62
mozilla
firefox
thunderbird
seamonkey
javascript
remote attackers
denial of service
crash
arbitrary code
cve-2009-0773
nvd

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

9.6

Confidence

High

EPSS

0.941

Percentile

99.2%

The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains “some non-set elements,” which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, defineSetter, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, defineSetter, and watch, which triggers a hang.

Affected configurations

Nvd
Node
mozillafirefoxRange3.0.6
OR
mozillafirefoxMatch1.0
OR
mozillafirefoxMatch1.0.1
OR
mozillafirefoxMatch1.0.2
OR
mozillafirefoxMatch1.0.3
OR
mozillafirefoxMatch1.0.4
OR
mozillafirefoxMatch1.0.5
OR
mozillafirefoxMatch1.0.6
OR
mozillafirefoxMatch1.0.7
OR
mozillafirefoxMatch1.0.8
OR
mozillafirefoxMatch1.5
OR
mozillafirefoxMatch1.5.0.1
OR
mozillafirefoxMatch1.5.0.2
OR
mozillafirefoxMatch1.5.0.3
OR
mozillafirefoxMatch1.5.0.4
OR
mozillafirefoxMatch1.5.0.5
OR
mozillafirefoxMatch1.5.0.6
OR
mozillafirefoxMatch1.5.0.7
OR
mozillafirefoxMatch1.5.0.8
OR
mozillafirefoxMatch1.5.0.9
OR
mozillafirefoxMatch1.5.0.10
OR
mozillafirefoxMatch1.5.0.11
OR
mozillafirefoxMatch1.5.0.12
OR
mozillafirefoxMatch2.0
OR
mozillafirefoxMatch2.0.0.1
OR
mozillafirefoxMatch2.0.0.2
OR
mozillafirefoxMatch2.0.0.3
OR
mozillafirefoxMatch2.0.0.4
OR
mozillafirefoxMatch2.0.0.5
OR
mozillafirefoxMatch2.0.0.6
OR
mozillafirefoxMatch2.0.0.7
OR
mozillafirefoxMatch2.0.0.8
OR
mozillafirefoxMatch2.0.0.9
OR
mozillafirefoxMatch2.0.0.10
OR
mozillafirefoxMatch2.0.0.11
OR
mozillafirefoxMatch2.0.0.12
OR
mozillafirefoxMatch2.0.0.13
OR
mozillafirefoxMatch2.0.0.14
OR
mozillafirefoxMatch2.0.0.15
OR
mozillafirefoxMatch2.0.0.16
OR
mozillafirefoxMatch2.0.0.17
OR
mozillafirefoxMatch2.0.0.18
OR
mozillafirefoxMatch2.0.0.19
OR
mozillafirefoxMatch2.0.0.20
OR
mozillafirefoxMatch3.0
OR
mozillafirefoxMatch3.0.1
OR
mozillafirefoxMatch3.0.2
OR
mozillafirefoxMatch3.0.3
OR
mozillafirefoxMatch3.0.4
OR
mozillafirefoxMatch3.0.5
OR
mozillaseamonkeyRange1.1.14
OR
mozillaseamonkeyMatch1.0
OR
mozillaseamonkeyMatch1.0.1
OR
mozillaseamonkeyMatch1.0.2
OR
mozillaseamonkeyMatch1.0.3
OR
mozillaseamonkeyMatch1.0.5
OR
mozillaseamonkeyMatch1.0.6
OR
mozillaseamonkeyMatch1.0.7
OR
mozillaseamonkeyMatch1.0.8
OR
mozillaseamonkeyMatch1.0.9
OR
mozillaseamonkeyMatch1.1
OR
mozillaseamonkeyMatch1.1alpha
OR
mozillaseamonkeyMatch1.1beta
OR
mozillaseamonkeyMatch1.1.1
OR
mozillaseamonkeyMatch1.1.2
OR
mozillaseamonkeyMatch1.1.3
OR
mozillaseamonkeyMatch1.1.4
OR
mozillaseamonkeyMatch1.1.5
OR
mozillaseamonkeyMatch1.1.6
OR
mozillaseamonkeyMatch1.1.7
OR
mozillaseamonkeyMatch1.1.8
OR
mozillaseamonkeyMatch1.1.9
OR
mozillaseamonkeyMatch1.1.10
OR
mozillaseamonkeyMatch1.1.11
OR
mozillaseamonkeyMatch1.1.12
OR
mozillaseamonkeyMatch1.1.13
OR
mozillathunderbirdRange2.0.0.20
OR
mozillathunderbirdMatch2.0.0.0
OR
mozillathunderbirdMatch2.0.0.4
OR
mozillathunderbirdMatch2.0.0.5
OR
mozillathunderbirdMatch2.0.0.6
OR
mozillathunderbirdMatch2.0.0.9
OR
mozillathunderbirdMatch2.0.0.12
OR
mozillathunderbirdMatch2.0.0.14
OR
mozillathunderbirdMatch2.0.0.16
OR
mozillathunderbirdMatch2.0.0.17
OR
mozillathunderbirdMatch2.0.0.18
OR
mozillathunderbirdMatch2.0.0.19
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillafirefox1.0cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
mozillafirefox1.0.1cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
mozillafirefox1.0.2cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
mozillafirefox1.0.3cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
mozillafirefox1.0.4cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
mozillafirefox1.0.5cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
mozillafirefox1.0.6cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
mozillafirefox1.0.7cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
mozillafirefox1.0.8cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
Rows per page:
1-10 of 881

References

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

9.6

Confidence

High

EPSS

0.941

Percentile

99.2%