Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:29408
[Rus]
Version
5
Class
patch
ALTXid
177908
Language
English
Severity
High
Title
openSUSE-SU-2010:0430-3 -- MozillaFirefox: Update to 3.6.8 security release
Description
This update brings Mozilla Firefox to the 3.6.8 security release
Family
unix
Platform
openSUSE 11.1
openSUSE 11.2
openSUSE 11.3
Product
mozilla-js192
Reference
VENDOR: openSUSE-SU-2010:0430-3
VENDOR: openSUSE-SU-2010:0430-3
Id:
openSUSE-SU-2010:0430-3
Reference:
https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html
CVE: CVE-2010-1211
CVE: CVE-2010-1211
Id:
CVE-2010-1211
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1211
Comment
: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=535926 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=529087 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=567059 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=574750 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=561539 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=564705 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=570657 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-34.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=566136 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=559241 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=528644 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=507775 (CONFIRM)
oval:org.mitre.oval:def:11552 (OVAL)
CVE: CVE-2010-1212
CVE: CVE-2010-1212
Id:
CVE-2010-1212
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1212
Comment
: js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) propagation of deep aborts in the TraceRecorder::record_JSOP_BINDNAME function, (2) depth handling in the TraceRecorder::record_JSOP_GETELEM function, and (3) tracing of out-of-range arguments in the TraceRecorder::record_JSOP_ARGSUB function.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=530955 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=568855 (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=558618 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-34.html (CONFIRM)
oval:org.mitre.oval:def:11771 (OVAL)
CVE: CVE-2010-1208
CVE: CVE-2010-1208
Id:
CVE-2010-1208
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1208
Comment
: Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=572986 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-35.html (CONFIRM)
41849 (BID)
http://www.zerodayinitiative.com/advisories/ZDI-10-134/ (MISC)
20100721 ZDI-10-134: Mozilla Firefox DOM Attribute Cloning Remote Code Execution Vulnerability (BUGTRAQ)
oval:org.mitre.oval:def:11740 (OVAL)
CVE: CVE-2010-1209
CVE: CVE-2010-1209
Id:
CVE-2010-1209
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1209
Comment
: Use-after-free vulnerability in the NodeIterator implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via a crafted NodeFilter that detaches DOM nodes, related to the NodeIterator interface and a javascript callback.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
399 (Resource Management Errors)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=552110 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-36.html (CONFIRM)
20100721 ZDI-10-130: Mozilla Firefox NodeIterator Remote Code Execution Vulnerability (BUGTRAQ)
41845 (BID)
http://www.zerodayinitiative.com/advisories/ZDI-10-130/ (MISC)
oval:org.mitre.oval:def:11055 (OVAL)
CVE: CVE-2010-1214
CVE: CVE-2010-1214
Id:
CVE-2010-1214
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214
Comment
: Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
189 (Numeric Errors)
References:
http://www.mozilla.org/security/announce/2010/mfsa2010-37.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=572985 (CONFIRM)
oval:org.mitre.oval:def:11685 (OVAL)
CVE: CVE-2010-1215
CVE: CVE-2010-1215
Id:
CVE-2010-1215
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1215
Comment
: Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE:
94 (Improper Control of Generation of Code ('Code Injection'))
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=567069 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-38.html (CONFIRM)
oval:org.mitre.oval:def:11527 (OVAL)
CVE: CVE-2010-2752
CVE: CVE-2010-2752
Id:
CVE-2010-2752
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752
Comment
: Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
189 (Numeric Errors)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=574059 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-39.html (CONFIRM)
20100721 ZDI-10-133: Mozilla Firefox CSS font-face Remote Code Execution Vulnerability (BUGTRAQ)
http://www.zerodayinitiative.com/advisories/ZDI-10-133/ (MISC)
41852 (BID)
oval:org.mitre.oval:def:11680 (OVAL)
CVE: CVE-2010-2753
CVE: CVE-2010-2753
Id:
CVE-2010-2753
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753
Comment
: Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
190 (Integer Overflow or Wraparound)
References:
http://www.mozilla.org/security/announce/2010/mfsa2010-40.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=571106 (CONFIRM)
http://www.zerodayinitiative.com/advisories/ZDI-10-131/ (MISC)
20100721 ZDI-10-131: Mozilla Firefox nsTreeSelection Dangling Pointer Remote Code Execution Vulnerability (BUGTRAQ)
41853 (BID)
SUSE-SA:2010:049 (SUSE)
oval:org.mitre.oval:def:10958 (OVAL)
CVE: CVE-2010-1205
CVE: CVE-2010-1205
Id:
CVE-2010-1205
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205
Comment
: Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
ADV-2010-1612 (VUPEN)
40302 (SECUNIA)
https://bugzilla.redhat.com/show_bug.cgi?id=608238 (CONFIRM)
41174 (BID)
http://www.libpng.org/pub/png/libpng.html (CONFIRM)
https://bugs.webkit.org/show_bug.cgi?id=40798 (CONFIRM)
http://code.google.com/p/chromium/issues/detail?id=45983 (CONFIRM)
http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html (CONFIRM)
http://trac.webkit.org/changeset/61816 (CONFIRM)
40472 (SECUNIA)
ADV-2010-1755 (VUPEN)
USN-960-1 (UBUNTU)
MDVSA-2010:133 (MANDRIVA)
DSA-2072 (DEBIAN)
FEDORA-2010-10833 (FEDORA)
40547 (SECUNIA)
FEDORA-2010-10823 (FEDORA)
ADV-2010-1846 (VUPEN)
https://bugzilla.mozilla.org/show_bug.cgi?id=570451 (CONFIRM)
ADV-2010-1837 (VUPEN)
ADV-2010-1877 (VUPEN)
APPLE-SA-2010-08-24-1 (APPLE)
http://support.apple.com/kb/HT4312 (CONFIRM)
SUSE-SR:2010:017 (SUSE)
http://www.vmware.com/security/advisories/VMSA-2010-0014.html (CONFIRM)
41574 (SECUNIA)
[security-announce] 20100923 VMSA-2010-0014 VMware Workstation, Player, and ACE address several security issues (MLIST)
ADV-2010-2491 (VUPEN)
APPLE-SA-2010-11-10-1 (APPLE)
http://support.apple.com/kb/HT4435 (CONFIRM)
http://support.apple.com/kb/HT4456 (CONFIRM)
APPLE-SA-2010-11-22-1 (APPLE)
ADV-2010-3045 (VUPEN)
ADV-2010-3046 (VUPEN)
http://support.apple.com/kb/HT4457 (CONFIRM)
42314 (SECUNIA)
42317 (SECUNIA)
APPLE-SA-2011-03-02-1 (APPLE)
http://support.apple.com/kb/HT4554 (CONFIRM)
APPLE-SA-2011-03-09-2 (APPLE)
http://support.apple.com/kb/HT4566 (CONFIRM)
http://blackberry.com/btsc/KB27244 (CONFIRM)
40336 (SECUNIA)
ADV-2010-1637 (VUPEN)
SSA:2010-180-01 (SLACKWARE)
http://www.mozilla.org/security/announce/2010/mfsa2010-41.html (CONFIRM)
libpng-rowdata-bo(59815) (XF)
oval:org.mitre.oval:def:11851 (OVAL)
http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commitdiff%3Bh=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18 ()
CVE: CVE-2010-1213
CVE: CVE-2010-1213
Id:
CVE-2010-1213
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1213
Comment
: The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=568148 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-42.html (CONFIRM)
oval:org.mitre.oval:def:11835 (OVAL)
CVE: CVE-2010-1207
CVE: CVE-2010-1207
Id:
CVE-2010-1207
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1207
Comment
: Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 do not properly implement read restrictions for CANVAS elements, which allows remote attackers to obtain sensitive cross-origin information via vectors involving reference retention and node deletion.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=571287 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-43.html (CONFIRM)
oval:org.mitre.oval:def:11887 (OVAL)
CVE: CVE-2010-1210
CVE: CVE-2010-1210
Id:
CVE-2010-1210
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1210
Comment
: intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=564679 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-44.html (CONFIRM)
oval:org.mitre.oval:def:11863 (OVAL)
CVE: CVE-2010-1206
CVE: CVE-2010-1206
Id:
CVE-2010-1206
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1206
Comment
: The startDocumentLoad function in browser/base/content/browser.js in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, does not properly implement the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors involving a 204 (aka No Content) status code, and allows (2) remote attackers to conduct spoofing attacks via vectors involving a window.stop call.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=556957 (CONFIRM)
40283 (SECUNIA)
http://lcamtuf.blogspot.com/2010/06/yeah-about-that-address-bar-thing.html (MISC)
http://hg.mozilla.org/mozilla-central/rev/cadddabb1178 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-45.html (CONFIRM)
oval:org.mitre.oval:def:8248 (OVAL)
CVE: CVE-2010-2751
CVE: CVE-2010-2751
Id:
CVE-2010-2751
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2751
Comment
: The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
CVSSv2 Score:
2.6
Access vector:
NETWORK
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:N/I:P/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=536466 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-45.html (CONFIRM)
oval:org.mitre.oval:def:11688 (OVAL)
CVE: CVE-2010-0654
CVE: CVE-2010-0654
Id:
CVE-2010-0654
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0654
Comment
: Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://code.google.com/p/chromium/issues/detail?id=9877 (MISC)
http://www.mozilla.org/security/announce/2010/mfsa2010-46.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=524223 (CONFIRM)
http://websec.sv.cmu.edu/css/css.pdf (MISC)
http://scarybeastsecurity.blogspot.com/2009/12/generic-cross-browser-cross-domain.html (MISC)
oval:org.mitre.oval:def:11811 (OVAL)
CVE: CVE-2010-2754
CVE: CVE-2010-2754
Id:
CVE-2010-2754
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2754
Comment
: dom/base/nsJSEnvironment.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not properly suppress a script's URL in certain circumstances involving a redirect and an error message, which allows remote attackers to obtain sensitive information about script parameters via a crafted HTML document, related to the window.onerror handler.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.mozilla.org/security/announce/2010/mfsa2010-47.html (CONFIRM)
https://bugzilla.mozilla.org/show_bug.cgi?id=568564 (CONFIRM)
oval:org.mitre.oval:def:11770 (OVAL)
CVE: CVE-2010-2755
CVE: CVE-2010-2755
Id:
CVE-2010-2755
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2755
Comment
: layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE:
399 (Resource Management Errors)
References:
https://bugzilla.mozilla.org/show_bug.cgi?id=575836 (CONFIRM)
http://www.mozilla.org/security/announce/2010/mfsa2010-48.html (CONFIRM)
oval:org.mitre.oval:def:11961 (OVAL)
Content available only for registered users!
ovaldb@altx-soft.com