Vulnerabilidad en Mozilla Firefox anterior a la v2.0.0.12, Inyección CRLF (CVE-2008-0417)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-94
Control incorrecto de generación de código (Inyección de código)
Fecha de publicación:
08/02/2008
Última modificación:
09/04/2025
Descripción
Vulnerabilidad de inyección CRLF en versiones anteriores a Mozilla Firefox 2.0.0.12 que permite a sitios web remotos con la intervención del usuario corromper la contraseña de usuario almacenada en las nuevas líneas que no son manejadas adecuadamente cuando el usuario guarda la contraseña.
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 2.0.0.11 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://browser.netscape.com/releasenotes/
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html
- http://secunia.com/advisories/28766
- http://secunia.com/advisories/28818
- http://secunia.com/advisories/28839
- http://secunia.com/advisories/28864
- http://secunia.com/advisories/28865
- http://secunia.com/advisories/28877
- http://secunia.com/advisories/28879
- http://secunia.com/advisories/28924
- http://secunia.com/advisories/28939
- http://secunia.com/advisories/28958
- http://secunia.com/advisories/29086
- http://secunia.com/advisories/29567
- http://secunia.com/advisories/30327
- http://secunia.com/advisories/30620
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
- http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html
- http://wiki.rpath.com/Advisories:rPSA-2008-0051
- http://www.debian.org/security/2008/dsa-1484
- http://www.debian.org/security/2008/dsa-1485
- http://www.debian.org/security/2008/dsa-1489
- http://www.debian.org/security/2008/dsa-1506
- http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A048
- http://www.mozilla.org/security/announce/2008/mfsa2008-04.html
- http://www.redhat.com/support/errata/RHSA-2008-0103.html
- http://www.redhat.com/support/errata/RHSA-2008-0104.html
- http://www.securityfocus.com/archive/1/487826/100/0/threaded
- http://www.securityfocus.com/archive/1/488002/100/0/threaded
- http://www.securityfocus.com/bid/27683
- http://www.securitytracker.com/id?1019334=
- http://www.ubuntu.com/usn/usn-576-1
- http://www.vupen.com/english/advisories/2008/0453/references
- http://www.vupen.com/english/advisories/2008/0627/references
- http://www.vupen.com/english/advisories/2008/1793/references
- https://bugzilla.mozilla.org/show_bug.cgi?id=394610
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11154
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html
- http://browser.netscape.com/releasenotes/
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html
- http://secunia.com/advisories/28766
- http://secunia.com/advisories/28818
- http://secunia.com/advisories/28839
- http://secunia.com/advisories/28864
- http://secunia.com/advisories/28865
- http://secunia.com/advisories/28877
- http://secunia.com/advisories/28879
- http://secunia.com/advisories/28924
- http://secunia.com/advisories/28939
- http://secunia.com/advisories/28958
- http://secunia.com/advisories/29086
- http://secunia.com/advisories/29567
- http://secunia.com/advisories/30327
- http://secunia.com/advisories/30620
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
- http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html
- http://wiki.rpath.com/Advisories:rPSA-2008-0051
- http://www.debian.org/security/2008/dsa-1484
- http://www.debian.org/security/2008/dsa-1485
- http://www.debian.org/security/2008/dsa-1489
- http://www.debian.org/security/2008/dsa-1506
- http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A048
- http://www.mozilla.org/security/announce/2008/mfsa2008-04.html
- http://www.redhat.com/support/errata/RHSA-2008-0103.html
- http://www.redhat.com/support/errata/RHSA-2008-0104.html
- http://www.securityfocus.com/archive/1/487826/100/0/threaded
- http://www.securityfocus.com/archive/1/488002/100/0/threaded
- http://www.securityfocus.com/bid/27683
- http://www.securitytracker.com/id?1019334=
- http://www.ubuntu.com/usn/usn-576-1
- http://www.vupen.com/english/advisories/2008/0453/references
- http://www.vupen.com/english/advisories/2008/0627/references
- http://www.vupen.com/english/advisories/2008/1793/references
- https://bugzilla.mozilla.org/show_bug.cgi?id=394610
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11154
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html