// For flags

CVE-2007-0776

 

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.

Un Desbordamiento de búfer en la región heap de la memoria en la función _cairo_pen_init en Mozilla Firefox versión 2.x anterior a 2.0.0.2, Thunderbird anterior a la versión 1.5.0.10, y SeaMonkey anterior a versión 1.0.8 permite a los atacantes remotos ejecutar código arbitrario por medio de un atributo stroke-width en el elemento clipPath en un archivo SVG.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-02-06 CVE Reserved
  • 2007-02-26 CVE Published
  • 2024-06-01 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (46)
URL Date SRC
URL Date SRC
http://fedoranews.org/cms/node/2713 2018-10-16
http://fedoranews.org/cms/node/2728 2018-10-16
http://fedoranews.org/cms/node/2747 2018-10-16
http://fedoranews.org/cms/node/2749 2018-10-16
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 2018-10-16
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html 2018-10-16
http://secunia.com/advisories/24205 2018-10-16
http://secunia.com/advisories/24238 2018-10-16
http://secunia.com/advisories/24252 2018-10-16
http://secunia.com/advisories/24293 2018-10-16
http://secunia.com/advisories/24320 2018-10-16
http://secunia.com/advisories/24328 2018-10-16
http://secunia.com/advisories/24333 2018-10-16
http://secunia.com/advisories/24384 2018-10-16
http://secunia.com/advisories/24389 2018-10-16
http://secunia.com/advisories/24393 2018-10-16
http://secunia.com/advisories/24406 2018-10-16
http://secunia.com/advisories/24410 2018-10-16
http://secunia.com/advisories/24437 2018-10-16
http://secunia.com/advisories/24455 2018-10-16
http://secunia.com/advisories/24456 2018-10-16
http://secunia.com/advisories/24457 2018-10-16
http://secunia.com/advisories/24522 2018-10-16
http://security.gentoo.org/glsa/glsa-200703-04.xml 2018-10-16
http://security.gentoo.org/glsa/glsa-200703-18.xml 2018-10-16
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 2018-10-16
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947 2018-10-16
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 2018-10-16
http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml 2018-10-16
http://www.mandriva.com/security/advisories?name=MDKSA-2007:052 2018-10-16
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html 2018-10-16
http://www.ubuntu.com/usn/usn-428-1 2018-10-16
http://www.ubuntu.com/usn/usn-431-1 2018-10-16
http://www.vupen.com/english/advisories/2007/0718 2018-10-16
http://www.vupen.com/english/advisories/2007/0719 2018-10-16
http://www.vupen.com/english/advisories/2008/0083 2018-10-16
https://bugzilla.mozilla.org/show_bug.cgi?id=360645 2018-10-16
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 2.0.0.1
Search vendor "Mozilla" for product "Firefox" and version " <= 2.0.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
<= 1.0.7
Search vendor "Mozilla" for product "Seamonkey" and version " <= 1.0.7"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 1.5.0.9
Search vendor "Mozilla" for product "Thunderbird" and version " <= 1.5.0.9"
-
Affected