CVE-2008-5021 : Dettaglio

CVE-2008-5021

25.26%V4
Network
2008-11-13
11h00 +00:00
2024-08-07
10h40 +00:00
Notifiche per una CVE specifica
Rimani informato su qualsiasi modifica relativa a una CVE specifica.
Gestione notifiche

Descrizioni CVE

nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.

Informazioni CVE

Vulnerabilità correlate

CWE-ID Nome della vulnerabilità Source
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

Metriche

Metriche Punteggio Gravità CVSS Vettore Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS è un modello di punteggio che prevede la probabilità che una vulnerabilità venga sfruttata.

Punteggio EPSS

Il modello EPSS produce un punteggio di probabilità compreso tra 0 e 1 (da 0 a 100%). Più alto è il punteggio, maggiore è la probabilità che una vulnerabilità venga sfruttata.

Percentile EPSS

Il percentile viene utilizzato per classificare le CVE in base al loro punteggio EPSS. Ad esempio, una CVE al 95° percentile secondo il suo punteggio EPSS ha una probabilità maggiore di essere sfruttata rispetto al 95% delle altre CVE. Il percentile consente quindi di confrontare il punteggio EPSS di una CVE con quello delle altre.

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version From (including) 2.0 To (excluding) 2.0.0.18

Mozilla>>Firefox >> Version From (including) 3.0 To (excluding) 3.0.4

Mozilla>>Seamonkey >> Version From (including) 1.0 To (excluding) 1.1.13

Mozilla>>Thunderbird >> Version From (including) 2.0 To (excluding) 2.0.0.18

Configuraton 0

Debian>>Debian_linux >> Version 4.0

Configuraton 0

Canonical>>Ubuntu_linux >> Version 6.06

Canonical>>Ubuntu_linux >> Version 7.10

Canonical>>Ubuntu_linux >> Version 8.04

Canonical>>Ubuntu_linux >> Version 8.10

Configuraton 0

Fedoraproject>>Fedora >> Version 8

Fedoraproject>>Fedora >> Version 9

Configuraton 0

Suse>>Linux_enterprise_debuginfo >> Version 10

Novell>>Linux_desktop >> Version 9

Novell>>Open_enterprise_server >> Version -

Opensuse>>Opensuse >> Version 10.2

Opensuse>>Opensuse >> Version 10.3

Opensuse>>Opensuse >> Version 11.0

Suse>>Linux_enterprise_desktop >> Version 10

Suse>>Linux_enterprise_server >> Version 9

Suse>>Linux_enterprise_server >> Version 10

Suse>>Linux_enterprise_software_development_kit >> Version 10

Suse>>Linux_enterprise_software_development_kit >> Version 10

Riferimenti

http://www.vupen.com/english/advisories/2008/3146
Tags : vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2009/dsa-1697
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2008/dsa-1671
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/32281
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/32713
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0977.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2009/0977
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/32695
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0978.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2008/dsa-1669
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/32778
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0976.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/33433
Tags : third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
Tags : vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/32694
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32721
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA08-319A.html
Tags : third-party-advisory, x_refsource_CERT
http://secunia.com/advisories/32853
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1696
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.securitytracker.com/id?1021186
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/32715
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32693
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/32845
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/33434
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32798
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32684
Tags : third-party-advisory, x_refsource_SECUNIA
http://ubuntu.com/usn/usn-667-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/32714
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/34501
Tags : third-party-advisory, x_refsource_SECUNIA