// For flags

CVE-2008-2807

Firefox .properties memory leak

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file.

Mozilla Firefox y versiones anteriores a la 2.0.0.15 y SeaMonkey y versiones anteriores a la 1.1.10 que no gestionan correctamente una propiedad inválida de un fichero para un complemento, el cual permite a los atacantes remotos leer memorias no inicializadas, como demuestra el cifrado ISO 8859 en lugar del cifrado UTF-8 en un propiedad francesa del fichero.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-06-20 CVE Reserved
  • 2008-07-07 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-401: Missing Release of Memory after Effective Lifetime
CAPEC
References (57)
URL Tag Source
http://secunia.com/advisories/30878 Third Party Advisory
http://secunia.com/advisories/30898 Third Party Advisory
http://secunia.com/advisories/30903 Third Party Advisory
http://secunia.com/advisories/30949 Third Party Advisory
http://secunia.com/advisories/31005 Third Party Advisory
http://secunia.com/advisories/31008 Third Party Advisory
http://secunia.com/advisories/31021 Third Party Advisory
http://secunia.com/advisories/31023 Third Party Advisory
http://secunia.com/advisories/31069 Third Party Advisory
http://secunia.com/advisories/31076 Third Party Advisory
http://secunia.com/advisories/31183 Third Party Advisory
http://secunia.com/advisories/31195 Third Party Advisory
http://secunia.com/advisories/31220 Third Party Advisory
http://secunia.com/advisories/31253 Third Party Advisory
http://secunia.com/advisories/31286 Third Party Advisory
http://secunia.com/advisories/31377 Third Party Advisory
http://secunia.com/advisories/31403 Third Party Advisory
http://secunia.com/advisories/33433 Third Party Advisory
http://secunia.com/advisories/34501 Third Party Advisory
http://wiki.rpath.com/Advisories:rPSA-2008-0216 X_refsource_confirm
http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15 X_refsource_confirm
http://www.mozilla.org/security/announce/2008/mfsa2008-29.html X_refsource_confirm
http://www.securityfocus.com/archive/1/494080/100/0/threaded Mailing List
http://www.securityfocus.com/bid/30038 Vdb Entry
http://www.securitytracker.com/id?1020419 Vdb Entry
http://www.vupen.com/english/advisories/2008/1993/references Vdb Entry
http://www.vupen.com/english/advisories/2009/0977 Vdb Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=397093 X_refsource_confirm
https://exchange.xforce.ibmcloud.com/vulnerabilities/50656 Vdb Entry
https://issues.rpath.com/browse/RPL-2646 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9432 Signature
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html 2018-10-11
http://rhn.redhat.com/errata/RHSA-2008-0616.html 2018-10-11
http://secunia.com/advisories/30911 2018-10-11
http://security.gentoo.org/glsa/glsa-200808-03.xml 2018-10-11
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152 2018-10-11
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911 2018-10-11
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484 2018-10-11
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 2018-10-11
http://www.debian.org/security/2008/dsa-1607 2018-10-11
http://www.debian.org/security/2008/dsa-1615 2018-10-11
http://www.debian.org/security/2008/dsa-1621 2018-10-11
http://www.debian.org/security/2009/dsa-1697 2018-10-11
http://www.mandriva.com/security/advisories?name=MDVSA-2008:136 2018-10-11
http://www.mandriva.com/security/advisories?name=MDVSA-2008:155 2018-10-11
http://www.redhat.com/support/errata/RHSA-2008-0547.html 2018-10-11
http://www.redhat.com/support/errata/RHSA-2008-0549.html 2018-10-11
http://www.redhat.com/support/errata/RHSA-2008-0569.html 2018-10-11
http://www.ubuntu.com/usn/usn-619-1 2018-10-11
http://www.ubuntu.com/usn/usn-629-1 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html 2018-10-11
https://access.redhat.com/security/cve/CVE-2008-2807 2008-07-23
https://bugzilla.redhat.com/show_bug.cgi?id=452709 2008-07-23
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 2.0.0.14
Search vendor "Mozilla" for product "Firefox" and version " <= 2.0.0.14"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0
Search vendor "Mozilla" for product "Firefox" and version "2.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.1
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.2
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.3
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.4
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.5
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.6
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.7
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.7"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.8
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.8"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.9
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.9"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.10
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.10"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.11
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.11"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.12
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.12"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
2.0.0.13
Search vendor "Mozilla" for product "Firefox" and version "2.0.0.13"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
<= 1.1.9
Search vendor "Mozilla" for product "Seamonkey" and version " <= 1.1.9"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1
Search vendor "Mozilla" for product "Seamonkey" and version "1.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.2
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.3
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.4
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.5
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.6
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.7
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.7"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
1.1.8
Search vendor "Mozilla" for product "Seamonkey" and version "1.1.8"
-
Affected