CVE-2008-0420

CVSS V2 High 9.3 CVSS V3 None
Description
modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 does not properly perform certain calculations related to the mColors table, which allows remote attackers to read portions of memory uninitialized via a crafted 8-bit bitmap (BMP) file that triggers an out-of-bounds read within the heap, as demonstrated using a CANVAS element; or cause a denial of service (application crash) via a crafted 8-bit bitmap file that triggers an out-of-bounds read. NOTE: the initial public reports stated that this affected Firefox in Ubuntu 6.06 through 7.10.
Overview
  • CVE ID
  • CVE-2008-0420
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2008-02-12T03:00:00
  • Last Modified Date
  • 2018-10-15T22:00:30
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 2.0.0.11
cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* 1 OR 1.1.7
cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* 1 OR 2.0.0.11
cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://secunia.com/advisories/28839 Vendor Advisory
http://www.mozilla.org/security/announce/2008/mfsa2008-07.html
https://bugzilla.mozilla.org/show_bug.cgi?id=408076
http://browser.netscape.com/releasenotes/
http://www.mandriva.com/security/advisories?name=MDVSA-2008:048
http://www.securityfocus.com/bid/27826
http://securitytracker.com/id?1019434
http://secunia.com/advisories/29049 Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html
http://www.ubuntu.com/usn/usn-582-1
http://secunia.com/advisories/28758 Vendor Advisory
http://secunia.com/advisories/29167 Vendor Advisory
http://www.ubuntu.com/usn/usn-582-2
http://secunia.com/advisories/29098 Vendor Advisory
http://secunia.com/advisories/30327 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://secunia.com/advisories/30620 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0627/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1793/references Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/40606
https://exchange.xforce.ibmcloud.com/vulnerabilities/40491
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10119
https://usn.ubuntu.com/576-1/
http://www.securityfocus.com/archive/1/488264/100/0/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 18:18:41 Added to TrackCVE