// For flags

CVE-2008-2802

Firefox arbitrary JavaScript code execution

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."

Mozilla Firefox y versiones anteriores a 2.0.0.15, Thunderbird 2.0.0.14 y anteriores, y SeaMonkey y anteriores a 1.1.10 permiten a los atacantes remotos ejecutar código arbitrario a través de un documento XUL que incluye una secuencia de comandos desde un chrome: URI que apunta a un archivo de carga rápida, relacionado con el nivel de permisos de este fichero.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-06-20 CVE Reserved
  • 2008-07-07 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (57)
URL Tag Source
http://secunia.com/advisories/30878 Third Party Advisory
http://secunia.com/advisories/30898 Third Party Advisory
http://secunia.com/advisories/30903 Third Party Advisory
http://secunia.com/advisories/30915 Third Party Advisory
http://secunia.com/advisories/30949 Third Party Advisory
http://secunia.com/advisories/31005 Third Party Advisory
http://secunia.com/advisories/31008 Third Party Advisory
http://secunia.com/advisories/31021 Third Party Advisory
http://secunia.com/advisories/31023 Third Party Advisory
http://secunia.com/advisories/31069 Third Party Advisory
http://secunia.com/advisories/31076 Third Party Advisory
http://secunia.com/advisories/31183 Third Party Advisory
http://secunia.com/advisories/31195 Third Party Advisory
http://secunia.com/advisories/31220 Third Party Advisory
http://secunia.com/advisories/31253 Third Party Advisory
http://secunia.com/advisories/31286 Third Party Advisory
http://secunia.com/advisories/31377 Third Party Advisory
http://secunia.com/advisories/31403 Third Party Advisory
http://secunia.com/advisories/33433 Third Party Advisory
http://secunia.com/advisories/34501 Third Party Advisory
http://wiki.rpath.com/Advisories:rPSA-2008-0216 X_refsource_confirm
http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15 X_refsource_confirm
http://www.mozilla.org/security/announce/2008/mfsa2008-24.html X_refsource_confirm
http://www.securityfocus.com/archive/1/494080/100/0/threaded Mailing List
http://www.securityfocus.com/bid/30038 Vdb Entry
http://www.securitytracker.com/id?1020419 Vdb Entry
http://www.vupen.com/english/advisories/2008/1993/references Vdb Entry
http://www.vupen.com/english/advisories/2009/0977 Vdb Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=419846 X_refsource_confirm
https://issues.rpath.com/browse/RPL-2646 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11121 Signature
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html 2018-10-11
http://rhn.redhat.com/errata/RHSA-2008-0616.html 2018-10-11
http://secunia.com/advisories/30911 2018-10-11
http://security.gentoo.org/glsa/glsa-200808-03.xml 2018-10-11
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152 2018-10-11
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911 2018-10-11
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484 2018-10-11
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 2018-10-11
http://www.debian.org/security/2008/dsa-1607 2018-10-11
http://www.debian.org/security/2008/dsa-1615 2018-10-11
http://www.debian.org/security/2008/dsa-1621 2018-10-11
http://www.debian.org/security/2009/dsa-1697 2018-10-11
http://www.mandriva.com/security/advisories?name=MDVSA-2008:136 2018-10-11
http://www.mandriva.com/security/advisories?name=MDVSA-2008:155 2018-10-11
http://www.redhat.com/support/errata/RHSA-2008-0547.html 2018-10-11
http://www.redhat.com/support/errata/RHSA-2008-0549.html 2018-10-11
http://www.redhat.com/support/errata/RHSA-2008-0569.html 2018-10-11
http://www.ubuntu.com/usn/usn-619-1 2018-10-11
http://www.ubuntu.com/usn/usn-629-1 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html 2018-10-11
https://access.redhat.com/security/cve/CVE-2008-2802 2008-07-23
https://bugzilla.redhat.com/show_bug.cgi?id=452600 2008-07-23
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 2.0.0.14
Search vendor "Mozilla" for product "Firefox" and version " <= 2.0.0.14"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0
Search vendor "Mozilla" for product "Firefox" and version "2.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.1
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.2
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.3
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.4
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.5
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.6
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.7
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.7"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.8
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.8"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.9
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.9"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.10
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.10"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.11
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.11"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.12
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.12"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.13
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.13"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
<= 1.1.9
Search vendor "Mozilla" for product "Seamonkey" and version " <= 1.1.9"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1
Search vendor "Mozilla" for product "Seamonkey" and version "1.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.2
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.3
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.4
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.5
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.6
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.7
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.7"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.8
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.8"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 2.0.0.14
Search vendor "Mozilla" for product "Thunderbird" and version " <= 2.0.0.14"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.0
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.1
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.2
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.3
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.4
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.5
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.6
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.8
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.8"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.9
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.9"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.11
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.11"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.12
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.12"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
2.0.0.13
Search vendor "Mozilla" for product "Thunderbird" and version "2.0.0.13"
-
Affected