CVE-2007-0994

CVSS V2 Medium 6.8 CVSS V3 None
Description
A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.
Overview
  • CVE ID
  • CVE-2007-0994
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2007-03-06T00:19:00
  • Last Modified Date
  • 2019-10-09T22:52:17
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 1.5 1.5.0.10
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 2.0 2.0.0.2
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* 1 OR 1.0 1.0.8
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* 1 OR 1.1 1.1.1
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
References
Reference URL Reference Tags
http://www.redhat.com/support/errata/RHSA-2007-0078.html Third Party Advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 Exploit Patch Issue Tracking Third Party Advisory
https://issues.rpath.com/browse/RPL-1103 Broken Link
http://www.mozilla.org/security/announce/2007/mfsa2007-09.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html Third Party Advisory
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html Broken Link
http://www.securityfocus.com/bid/22826 Third Party Advisory VDB Entry
http://securitytracker.com/id?1017726 Third Party Advisory VDB Entry
http://secunia.com/advisories/24395 Third Party Advisory
http://secunia.com/advisories/24384 Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc Broken Link
http://secunia.com/advisories/24650 Third Party Advisory
http://www.debian.org/security/2007/dsa-1336 Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 Mailing List Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html Broken Link
http://secunia.com/advisories/24455 Third Party Advisory
http://secunia.com/advisories/24457 Third Party Advisory
http://secunia.com/advisories/25588 Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc Broken Link
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
http://www.vupen.com/english/advisories/2007/0823 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:15:28 Added to TrackCVE