// For flags

CVE-2008-0412

Mozilla layout engine crashes

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.

El motor de búsqueda en Mozilla Firefox versiones anteriores a la 2.0.0.12, Thunderbird versiones anteriores a la 2.0.0.12 y SeaMonkey versiones anteriores a la 1.1.8 permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente disparar una corrupción de memoria a través de vectores relacionados con los métodos (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame y (6) nsLineLayout::TrimTrailingWhiteSpaceIn y con otros vectores.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-01-23 CVE Reserved
  • 2008-02-08 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-20 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-399: Resource Management Errors
CAPEC
References (67)
URL Tag Source
http://browser.netscape.com/releasenotes X_refsource_confirm
http://secunia.com/advisories/28924 Third Party Advisory
http://secunia.com/advisories/28939 Third Party Advisory
http://secunia.com/advisories/29086 Third Party Advisory
http://secunia.com/advisories/29098 Third Party Advisory
http://secunia.com/advisories/29164 Third Party Advisory
http://secunia.com/advisories/29167 Third Party Advisory
http://secunia.com/advisories/29211 Third Party Advisory
http://secunia.com/advisories/29567 Third Party Advisory
http://secunia.com/advisories/30327 Third Party Advisory
http://secunia.com/advisories/30620 Third Party Advisory
http://secunia.com/advisories/31043 Third Party Advisory
http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html X_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0051 X_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0093 X_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093 X_refsource_confirm
http://www.mozilla.org/security/announce/2008/mfsa2008-01.html X_refsource_confirm
http://www.securityfocus.com/archive/1/487826/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/488002/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/488971/100/0/threaded Mailing List
http://www.securityfocus.com/bid/27683 Vdb Entry
http://www.securitytracker.com/id?1019320 Vdb Entry
http://www.vupen.com/english/advisories/2008/0453/references Vdb Entry
http://www.vupen.com/english/advisories/2008/0454/references Vdb Entry
http://www.vupen.com/english/advisories/2008/0627/references Vdb Entry
http://www.vupen.com/english/advisories/2008/1793/references Vdb Entry
http://www.vupen.com/english/advisories/2008/2091/references Vdb Entry
https://bugzilla.mozilla.org/buglist.cgi?bug_id=398088%2C393141%2C364801%2C346405%2C396613%2C394337%2C406290 X_refsource_confirm
https://issues.rpath.com/browse/RPL-1995 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10573 Signature
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html 2023-11-07
http://secunia.com/advisories/28754 2023-11-07
http://secunia.com/advisories/28758 2023-11-07
http://secunia.com/advisories/28766 2023-11-07
http://secunia.com/advisories/28808 2023-11-07
http://secunia.com/advisories/28815 2023-11-07
http://secunia.com/advisories/28818 2023-11-07
http://secunia.com/advisories/28839 2023-11-07
http://secunia.com/advisories/28864 2023-11-07
http://secunia.com/advisories/28865 2023-11-07
http://secunia.com/advisories/28877 2023-11-07
http://secunia.com/advisories/28879 2023-11-07
http://secunia.com/advisories/28958 2023-11-07
http://secunia.com/advisories/29049 2023-11-07
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.445399 2023-11-07
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 2023-11-07
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 2023-11-07
http://www.debian.org/security/2008/dsa-1484 2023-11-07
http://www.debian.org/security/2008/dsa-1485 2023-11-07
http://www.debian.org/security/2008/dsa-1489 2023-11-07
http://www.debian.org/security/2008/dsa-1506 2023-11-07
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml 2023-11-07
http://www.mandriva.com/security/advisories?name=MDVSA-2008:048 2023-11-07
http://www.mandriva.com/security/advisories?name=MDVSA-2008:062 2023-11-07
http://www.redhat.com/support/errata/RHSA-2008-0103.html 2023-11-07
http://www.redhat.com/support/errata/RHSA-2008-0104.html 2023-11-07
http://www.redhat.com/support/errata/RHSA-2008-0105.html 2023-11-07
http://www.ubuntu.com/usn/usn-576-1 2023-11-07
http://www.ubuntu.com/usn/usn-582-1 2023-11-07
http://www.ubuntu.com/usn/usn-582-2 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html 2023-11-07
https://access.redhat.com/security/cve/CVE-2008-0412 2008-02-08
https://bugzilla.redhat.com/show_bug.cgi?id=431732 2008-02-08
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 2.0.0.11
Search vendor "Mozilla" for product "Firefox" and version " <= 2.0.0.11"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
<= 1.1.7
Search vendor "Mozilla" for product "Seamonkey" and version " <= 1.1.7"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 2.0.0.11
Search vendor "Mozilla" for product "Thunderbird" and version " <= 2.0.0.11"
-
Affected