CVE-2008-5013 : Details

CVE-2008-5013

23.92%V4
Network
2008-11-13
11h00 +00:00
2024-08-07
10h40 +00:00
Benachrichtigungen für ein CVE
Bleiben Sie über alle Änderungen zu einem bestimmten CVE informiert.
Benachrichtigungen verwalten

CVE-Beschreibungen

Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.

CVE-Informationen

Verwandte Schwachstellen

CWE-ID Name der Schwachstelle Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Metriken

Metriken Score Schweregrad CVSS Vektor Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS ist ein Bewertungsmodell, das die Wahrscheinlichkeit vorhersagt, dass eine Schwachstelle ausgenutzt wird.

EPSS-Score

Das EPSS-Modell liefert einen Wahrscheinlichkeitswert zwischen 0 und 1 (0 und 100%). Je höher der Score, desto größer die Wahrscheinlichkeit, dass eine Schwachstelle ausgenutzt wird.

EPSS-Perzentil

Das Perzentil wird verwendet, um CVEs nach ihrem EPSS-Score zu ranken. Ein CVE im 95. Perzentil gemäß seinem EPSS-Score ist beispielsweise mit größerer Wahrscheinlichkeit ausnutzbar als 95% der anderen CVEs. Das Perzentil dient somit zum Vergleich des EPSS-Scores eines CVEs mit dem anderer CVEs.

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version To (including) 2.0.0.17

Mozilla>>Firefox >> Version 0.8

Mozilla>>Firefox >> Version 0.9

Mozilla>>Firefox >> Version 0.9

Mozilla>>Firefox >> Version 0.9.1

Mozilla>>Firefox >> Version 0.9.2

Mozilla>>Firefox >> Version 0.9.3

Mozilla>>Firefox >> Version 0.9_rc

Mozilla>>Firefox >> Version 0.10

Mozilla>>Firefox >> Version 0.10.1

Mozilla>>Firefox >> Version 1.0

Mozilla>>Firefox >> Version 1.0.1

Mozilla>>Firefox >> Version 1.0.2

Mozilla>>Firefox >> Version 1.0.3

Mozilla>>Firefox >> Version 1.0.4

Mozilla>>Firefox >> Version 1.0.5

Mozilla>>Firefox >> Version 1.0.6

Mozilla>>Firefox >> Version 1.0.6

Mozilla>>Firefox >> Version 1.0.7

Mozilla>>Firefox >> Version 1.0.8

Mozilla>>Firefox >> Version 1.5

Mozilla>>Firefox >> Version 1.5

Mozilla>>Firefox >> Version 1.5

Mozilla>>Firefox >> Version 1.5.0.1

Mozilla>>Firefox >> Version 1.5.0.2

Mozilla>>Firefox >> Version 1.5.0.3

Mozilla>>Firefox >> Version 1.5.0.4

Mozilla>>Firefox >> Version 1.5.0.5

Mozilla>>Firefox >> Version 1.5.0.6

Mozilla>>Firefox >> Version 1.5.0.7

Mozilla>>Firefox >> Version 1.5.0.8

Mozilla>>Firefox >> Version 1.5.0.9

Mozilla>>Firefox >> Version 1.5.0.10

Mozilla>>Firefox >> Version 1.5.0.11

Mozilla>>Firefox >> Version 1.5.0.12

Mozilla>>Firefox >> Version 1.5.1

Mozilla>>Firefox >> Version 1.5.2

Mozilla>>Firefox >> Version 1.5.3

Mozilla>>Firefox >> Version 1.5.4

Mozilla>>Firefox >> Version 1.5.5

Mozilla>>Firefox >> Version 1.5.6

Mozilla>>Firefox >> Version 1.5.7

Mozilla>>Firefox >> Version 1.5.8

Mozilla>>Firefox >> Version 1.8

Mozilla>>Firefox >> Version 2.0

Mozilla>>Firefox >> Version 2.0.0.1

Mozilla>>Firefox >> Version 2.0.0.2

Mozilla>>Firefox >> Version 2.0.0.3

Mozilla>>Firefox >> Version 2.0.0.4

Mozilla>>Firefox >> Version 2.0.0.5

Mozilla>>Firefox >> Version 2.0.0.6

Mozilla>>Firefox >> Version 2.0.0.7

Mozilla>>Firefox >> Version 2.0.0.8

Mozilla>>Firefox >> Version 2.0.0.9

Mozilla>>Firefox >> Version 2.0.0.10

Mozilla>>Firefox >> Version 2.0.0.11

Mozilla>>Firefox >> Version 2.0.0.12

Mozilla>>Firefox >> Version 2.0.0.13

Mozilla>>Firefox >> Version 2.0.0.14

Mozilla>>Firefox >> Version 2.0.0.15

Mozilla>>Firefox >> Version 2.0.0.16

Mozilla>>Seamonkey >> Version To (including) 1.1.12

Mozilla>>Seamonkey >> Version 1.0

Mozilla>>Seamonkey >> Version 1.0

Mozilla>>Seamonkey >> Version 1.0

Mozilla>>Seamonkey >> Version 1.0

Mozilla>>Seamonkey >> Version 1.0

Mozilla>>Seamonkey >> Version 1.0.1

Mozilla>>Seamonkey >> Version 1.0.2

Mozilla>>Seamonkey >> Version 1.0.3

Mozilla>>Seamonkey >> Version 1.0.4

Mozilla>>Seamonkey >> Version 1.0.5

Mozilla>>Seamonkey >> Version 1.0.6

Mozilla>>Seamonkey >> Version 1.0.7

Mozilla>>Seamonkey >> Version 1.0.8

Mozilla>>Seamonkey >> Version 1.0.9

Mozilla>>Seamonkey >> Version 1.0.99

Mozilla>>Seamonkey >> Version 1.1

Mozilla>>Seamonkey >> Version 1.1

Mozilla>>Seamonkey >> Version 1.1.1

Mozilla>>Seamonkey >> Version 1.1.2

Mozilla>>Seamonkey >> Version 1.1.3

Mozilla>>Seamonkey >> Version 1.1.4

Mozilla>>Seamonkey >> Version 1.1.5

Mozilla>>Seamonkey >> Version 1.1.5

Mozilla>>Seamonkey >> Version 1.1.6

Mozilla>>Seamonkey >> Version 1.1.7

Mozilla>>Seamonkey >> Version 1.1.8

Mozilla>>Seamonkey >> Version 1.1.9

Mozilla>>Seamonkey >> Version 1.1.10

Mozilla>>Seamonkey >> Version 1.1.11

Referenzen

http://www.vupen.com/english/advisories/2008/3146
Tags : vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2009/dsa-1697
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2008/dsa-1671
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/32281
Tags : vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2008-0977.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2009/0977
Tags : vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2008/dsa-1669
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/32778
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/33433
Tags : third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
Tags : vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/32694
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA08-319A.html
Tags : third-party-advisory, x_refsource_CERT
http://secunia.com/advisories/32853
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32693
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1021181
Tags : vdb-entry, x_refsource_SECTRACK
http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/32845
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32684
Tags : third-party-advisory, x_refsource_SECUNIA
http://ubuntu.com/usn/usn-667-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/32714
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/34501
Tags : third-party-advisory, x_refsource_SECUNIA