CVE-2007-0777
Advisory lineage Upstream: 0 Downstream: 7
Deferred
Published: 26 Feb 2007, 19:00
Last modified:07 Aug 2024, 12:34
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
9.3 HIGH
v2.0 (nvd)
EPSS Score
42.76% HIGH
43% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
26 Feb 2007, 19:00
Published
Vulnerability first disclosed
07 Aug 2024, 12:34
Last Modified
Vulnerability information updated
Description
The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.
CVSS Metrics
- v2.0•HIGH•Score: 9.3AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS Trends
Current EPSS score: 42.76%• Percentile: 97%
Techniques & Countermeasures
- CWE-119•Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Affected Systems
- canonical•ubuntu_linux
5.10 | 6.06 | 6.10
- Unknown•Firefox
≥ 1.5, < 1.5.0.10 | ≥ 2.0, < 2.0.0.2
- mozilla•seamonkey
< 1.0.8
- mozilla•thunderbird
< 1.5.0.10
References (61)
- http://www.redhat.com/support/errata/RHSA-2007-0078.html
- http://secunia.com/advisories/24395
- http://www.kb.cert.org/vuls/id/269484
- http://www.securityfocus.com/archive/1/461336/100/0/threaded
- http://fedoranews.org/cms/node/2747
- http://secunia.com/advisories/24328
- http://www.redhat.com/support/errata/RHSA-2007-0108.html
- http://security.gentoo.org/glsa/glsa-200703-04.xml
- http://secunia.com/advisories/24252
- http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
- http://secunia.com/advisories/24384
- http://secunia.com/advisories/24406
- http://secunia.com/advisories/24457
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:052
- http://secunia.com/advisories/24343
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11331
- http://www.vupen.com/english/advisories/2007/0718
- http://fedoranews.org/cms/node/2749
- http://security.gentoo.org/glsa/glsa-200703-18.xml
- http://secunia.com/advisories/24650
- http://www.ubuntu.com/usn/usn-428-1
- http://secunia.com/advisories/24320
- https://issues.rpath.com/browse/RPL-1103
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32699
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
- http://www.vupen.com/english/advisories/2008/0083
- http://www.securityfocus.com/archive/1/461809/100/0/threaded
- http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
- http://secunia.com/advisories/24293
- http://secunia.com/advisories/24238
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947
- http://secunia.com/advisories/24456
- http://secunia.com/advisories/24393
- http://secunia.com/advisories/24342
- http://secunia.com/advisories/24287
- http://secunia.com/advisories/24522
- http://www.securityfocus.com/bid/22694
- http://www.osvdb.org/32115
- http://www.vupen.com/english/advisories/2007/0719
- http://fedoranews.org/cms/node/2713
- http://www.mozilla.org/security/announce/2007/mfsa2007-01.html
- http://www.ubuntu.com/usn/usn-431-1
- http://www.redhat.com/support/errata/RHSA-2007-0097.html
- http://fedoranews.org/cms/node/2728
- ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
- http://secunia.com/advisories/24205
- http://secunia.com/advisories/24389
- https://issues.rpath.com/browse/RPL-1081
- http://secunia.com/advisories/24410
- http://secunia.com/advisories/24333
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:050
- http://secunia.com/advisories/24290
- http://secunia.com/advisories/24455
- http://rhn.redhat.com/errata/RHSA-2007-0077.html
- ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
- http://www.securitytracker.com/id?1017698
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
- http://www.redhat.com/support/errata/RHSA-2007-0079.html
- http://secunia.com/advisories/24437