CVE-2007-1092
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
26/02/2007
Última modificación:
09/04/2025
Descripción
Mozilla Firefox 1.5.0.9 y 2.0.0.1, y SeaMonkey versiones anteriores a 1.0.8 permite a atacantes remotos ejecutar código de su elección mediante gestores Javascript onUnload que modifican la estructura de un documento, lo cual dispara corrupción de memoria debido una deficiencia de un enganche (hook) finalize en objetos DOM tipo window.
Impacto
Puntuación base 2.0
9.30
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* | 1.0.7 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
- ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
- http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0525.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
- http://osvdb.org/32103
- http://secunia.com/advisories/24333
- http://secunia.com/advisories/24343
- http://secunia.com/advisories/24384
- http://secunia.com/advisories/24395
- http://secunia.com/advisories/24457
- http://secunia.com/advisories/24650
- http://securityreason.com/securityalert/2302
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
- http://www.kb.cert.org/vuls/id/393921
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A050
- http://www.mozilla.org/security/announce/2007/mfsa2007-08.html
- http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
- http://www.redhat.com/support/errata/RHSA-2007-0078.html
- http://www.securityfocus.com/archive/1/461024/100/0/threaded
- http://www.securityfocus.com/bid/22679
- http://www.securitytracker.com/id?1017701=
- http://www.ubuntu.com/usn/usn-428-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=371321
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32647
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32648
- https://issues.rpath.com/browse/RPL-1103
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11158
- ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
- ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
- http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0525.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
- http://osvdb.org/32103
- http://secunia.com/advisories/24333
- http://secunia.com/advisories/24343
- http://secunia.com/advisories/24384
- http://secunia.com/advisories/24395
- http://secunia.com/advisories/24457
- http://secunia.com/advisories/24650
- http://securityreason.com/securityalert/2302
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
- http://www.kb.cert.org/vuls/id/393921
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A050
- http://www.mozilla.org/security/announce/2007/mfsa2007-08.html
- http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
- http://www.redhat.com/support/errata/RHSA-2007-0078.html
- http://www.securityfocus.com/archive/1/461024/100/0/threaded
- http://www.securityfocus.com/bid/22679
- http://www.securitytracker.com/id?1017701=
- http://www.ubuntu.com/usn/usn-428-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=371321
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32647
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32648
- https://issues.rpath.com/browse/RPL-1103
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11158