Lucene search

K
cve[email protected]CVE-2009-2464
HistoryJul 22, 2009 - 6:30 p.m.

CVE-2009-2464

2009-07-2218:30:00
CWE-399
web.nvd.nist.gov
47
mozilla
firefox
seamonkey
thunderbird
memory corruption
cve-2009-2464
security vulnerability
application crash
remote code execution
nvd

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9 High

AI Score

Confidence

High

0.58 Medium

EPSS

Percentile

97.7%

The nsXULTemplateQueryProcessorRDF::CheckIsSeparator function in Mozilla Firefox before 3.0.12, SeaMonkey 2.0a1pre, and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to loading multiple RDF files in a XUL tree element.

Affected configurations

NVD
Node
mozillafirefoxRange3.0.11
OR
mozillafirefoxMatch0.1
OR
mozillafirefoxMatch0.2
OR
mozillafirefoxMatch0.3
OR
mozillafirefoxMatch0.4
OR
mozillafirefoxMatch0.5
OR
mozillafirefoxMatch0.6
OR
mozillafirefoxMatch0.6.1
OR
mozillafirefoxMatch0.7
OR
mozillafirefoxMatch0.7.1
OR
mozillafirefoxMatch0.8
OR
mozillafirefoxMatch0.9
OR
mozillafirefoxMatch0.9rc
OR
mozillafirefoxMatch0.9.1
OR
mozillafirefoxMatch0.9.2
OR
mozillafirefoxMatch0.9.3
OR
mozillafirefoxMatch0.9_rc
OR
mozillafirefoxMatch0.10
OR
mozillafirefoxMatch0.10.1
OR
mozillafirefoxMatch1.0
OR
mozillafirefoxMatch1.0preview_release
OR
mozillafirefoxMatch1.0.1
OR
mozillafirefoxMatch1.0.2
OR
mozillafirefoxMatch1.0.3
OR
mozillafirefoxMatch1.0.4
OR
mozillafirefoxMatch1.0.5
OR
mozillafirefoxMatch1.0.6
OR
mozillafirefoxMatch1.0.6linux
OR
mozillafirefoxMatch1.0.7
OR
mozillafirefoxMatch1.0.8
OR
mozillafirefoxMatch1.4.1
OR
mozillafirefoxMatch1.5
OR
mozillafirefoxMatch1.5beta1
OR
mozillafirefoxMatch1.5beta2
OR
mozillafirefoxMatch1.5.0.1
OR
mozillafirefoxMatch1.5.0.2
OR
mozillafirefoxMatch1.5.0.3
OR
mozillafirefoxMatch1.5.0.4
OR
mozillafirefoxMatch1.5.0.5
OR
mozillafirefoxMatch1.5.0.6
OR
mozillafirefoxMatch1.5.0.7
OR
mozillafirefoxMatch1.5.0.8
OR
mozillafirefoxMatch1.5.0.9
OR
mozillafirefoxMatch1.5.0.10
OR
mozillafirefoxMatch1.5.0.11
OR
mozillafirefoxMatch1.5.0.12
OR
mozillafirefoxMatch1.5.1
OR
mozillafirefoxMatch1.5.2
OR
mozillafirefoxMatch1.5.3
OR
mozillafirefoxMatch1.5.4
OR
mozillafirefoxMatch1.5.5
OR
mozillafirefoxMatch1.5.6
OR
mozillafirefoxMatch1.5.7
OR
mozillafirefoxMatch1.5.8
OR
mozillafirefoxMatch1.8
OR
mozillafirefoxMatch2.0
OR
mozillafirefoxMatch2.0beta_1
OR
mozillafirefoxMatch2.0beta1
OR
mozillafirefoxMatch2.0rc2
OR
mozillafirefoxMatch2.0rc3
OR
mozillafirefoxMatch2.0.0.1
OR
mozillafirefoxMatch2.0.0.2
OR
mozillafirefoxMatch2.0.0.3
OR
mozillafirefoxMatch2.0.0.4
OR
mozillafirefoxMatch2.0.0.5
OR
mozillafirefoxMatch2.0.0.6
OR
mozillafirefoxMatch2.0.0.7
OR
mozillafirefoxMatch2.0.0.8
OR
mozillafirefoxMatch2.0.0.9
OR
mozillafirefoxMatch2.0.0.10
OR
mozillafirefoxMatch2.0.0.11
OR
mozillafirefoxMatch2.0.0.12
OR
mozillafirefoxMatch2.0.0.13
OR
mozillafirefoxMatch2.0.0.14
OR
mozillafirefoxMatch2.0.0.15
OR
mozillafirefoxMatch2.0.0.16
OR
mozillafirefoxMatch2.0.0.17
OR
mozillafirefoxMatch2.0.0.18
OR
mozillafirefoxMatch2.0.0.19
OR
mozillafirefoxMatch2.0.0.20
OR
mozillafirefoxMatch2.0.0.21
OR
mozillafirefoxMatch3.0
OR
mozillafirefoxMatch3.0alpha
OR
mozillafirefoxMatch3.0beta2
OR
mozillafirefoxMatch3.0beta5
OR
mozillafirefoxMatch3.0.1
OR
mozillafirefoxMatch3.0.2
OR
mozillafirefoxMatch3.0.3
OR
mozillafirefoxMatch3.0.4
OR
mozillafirefoxMatch3.0.5
OR
mozillafirefoxMatch3.0.6
OR
mozillafirefoxMatch3.0.7
OR
mozillafirefoxMatch3.0.8
OR
mozillafirefoxMatch3.0.9
OR
mozillafirefoxMatch3.0.10
OR
mozillaseamonkeyMatch2.0a1pre
OR
mozillathunderbirdMatch2.0.0.0
OR
mozillathunderbirdMatch2.0.0.1
OR
mozillathunderbirdMatch2.0.0.2
OR
mozillathunderbirdMatch2.0.0.3
OR
mozillathunderbirdMatch2.0.0.4
OR
mozillathunderbirdMatch2.0.0.5
OR
mozillathunderbirdMatch2.0.0.6
OR
mozillathunderbirdMatch2.0.0.7
OR
mozillathunderbirdMatch2.0.0.8
OR
mozillathunderbirdMatch2.0.0.9
OR
mozillathunderbirdMatch2.0.0.11
OR
mozillathunderbirdMatch2.0.0.12
OR
mozillathunderbirdMatch2.0.0.13
OR
mozillathunderbirdMatch2.0.0.14
OR
mozillathunderbirdMatch2.0.0.15
OR
mozillathunderbirdMatch2.0.0.16
OR
mozillathunderbirdMatch2.0.0.17
OR
mozillathunderbirdMatch2.0.0.18
OR
mozillathunderbirdMatch2.0.0.19
OR
mozillathunderbirdMatch2.0.0.20
OR
mozillathunderbirdMatch2.0.0.21

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9 High

AI Score

Confidence

High

0.58 Medium

EPSS

Percentile

97.7%