CVE-2007-0994

A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.
References
Link Resource
http://www.redhat.com/support/errata/RHSA-2007-0078.html Third Party Advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 Exploit Patch
https://issues.rpath.com/browse/RPL-1103 Broken Link
http://www.mozilla.org/security/announce/2007/mfsa2007-09.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html Third Party Advisory
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html Broken Link
http://www.securityfocus.com/bid/22826 Third Party Advisory VDB Entry
http://securitytracker.com/id?1017726 Third Party Advisory VDB Entry
http://secunia.com/advisories/24395 Third Party Advisory
http://secunia.com/advisories/24384 Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc Broken Link
http://secunia.com/advisories/24650 Third Party Advisory
http://www.debian.org/security/2007/dsa-1336 Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 Mailing List Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html Broken Link
http://secunia.com/advisories/24455 Third Party Advisory
http://secunia.com/advisories/24457 Third Party Advisory
http://secunia.com/advisories/25588 Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc Broken Link
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
http://www.vupen.com/english/advisories/2007/0823 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

Information

Published : 2007-03-06 12:19

Updated : 2019-10-09 10:52


NVD link : CVE-2007-0994

Mitre link : CVE-2007-0994

Products Affected
No products.
CWE