CVE-2007-0777

CVSS V2 High 9.3 CVSS V3 None
Description
The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.
Overview
  • CVE ID
  • CVE-2007-0777
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2007-02-26T19:28:00
  • Last Modified Date
  • 2019-10-09T22:52:10
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 1.5 1.5.0.10
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 2.0 2.0.0.2
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* 1 OR 1.0.8
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* 1 OR 1.5.0.10
cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://www.mozilla.org/security/announce/2007/mfsa2007-01.html Patch Vendor Advisory
https://issues.rpath.com/browse/RPL-1081 Broken Link
https://issues.rpath.com/browse/RPL-1103 Broken Link
http://fedoranews.org/cms/node/2713 Broken Link
http://fedoranews.org/cms/node/2728 Broken Link
http://security.gentoo.org/glsa/glsa-200703-04.xml Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml Third Party Advisory
http://security.gentoo.org/glsa/glsa-200703-18.xml Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:052 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0079.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2007-0077.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0078.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0108.html Third Party Advisory
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html Broken Link
http://www.ubuntu.com/usn/usn-428-1 Third Party Advisory
http://www.ubuntu.com/usn/usn-431-1 Third Party Advisory
http://www.kb.cert.org/vuls/id/269484 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/22694 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1017698 VDB Entry Third Party Advisory
http://secunia.com/advisories/24238 Third Party Advisory
http://secunia.com/advisories/24252 Third Party Advisory
http://secunia.com/advisories/24287 Third Party Advisory
http://secunia.com/advisories/24290 Third Party Advisory
http://secunia.com/advisories/24205 Third Party Advisory
http://secunia.com/advisories/24328 Third Party Advisory
http://secunia.com/advisories/24333 Third Party Advisory
http://secunia.com/advisories/24343 Third Party Advisory
http://secunia.com/advisories/24320 Third Party Advisory
http://secunia.com/advisories/24293 Third Party Advisory
http://secunia.com/advisories/24393 Third Party Advisory
http://secunia.com/advisories/24395 Third Party Advisory
http://secunia.com/advisories/24384 Third Party Advisory
http://secunia.com/advisories/24389 Third Party Advisory
http://secunia.com/advisories/24410 Third Party Advisory
http://secunia.com/advisories/24437 Third Party Advisory
http://secunia.com/advisories/24522 Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc Broken Link
http://secunia.com/advisories/24650 Third Party Advisory
http://fedoranews.org/cms/node/2747 Broken Link
http://fedoranews.org/cms/node/2749 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:050 Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc Broken Link
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947 Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 Mailing List Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html Broken Link
http://www.osvdb.org/32115 Broken Link
http://secunia.com/advisories/24406 Third Party Advisory
http://secunia.com/advisories/24455 Third Party Advisory
http://secunia.com/advisories/24456 Third Party Advisory
http://secunia.com/advisories/24457 Third Party Advisory
http://secunia.com/advisories/24342 Third Party Advisory
http://www.vupen.com/english/advisories/2007/0718 Third Party Advisory
http://www.vupen.com/english/advisories/2007/0719 Third Party Advisory
http://www.vupen.com/english/advisories/2008/0083 Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/32699 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11331 Third Party Advisory
http://www.securityfocus.com/archive/1/461809/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/461336/100/0/threaded VDB Entry Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:15:32 Added to TrackCVE