CVE-2003-0791

The Script.prototype.freeze/thaw functionality in Mozilla 1.4 and earlier allows attackers to execute native methods by modifying the string used as input to the script.thaw JavaScript function, which is then deserialized and executed.
References
Link Resource
http://secunia.com/advisories/11103/ URL Repurposed
http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 Broken Link
http://www.osvdb.org/8390 Broken Link Patch Vendor Advisory
http://www.securityfocus.com/advisories/6979 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/9322 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=221526 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*

History

25 Jan 2024, 02:14

Type Values Removed Values Added
References () http://secunia.com/advisories/11103/ - Patch, Vendor Advisory () http://secunia.com/advisories/11103/ - URL Repurposed
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 - () http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 - Broken Link
References () http://www.osvdb.org/8390 - Patch, Vendor Advisory () http://www.osvdb.org/8390 - Broken Link, Patch, Vendor Advisory
References () http://www.securityfocus.com/advisories/6979 - Patch, Vendor Advisory () http://www.securityfocus.com/advisories/6979 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () http://www.securityfocus.com/bid/9322 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/9322 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=221526 - Patch, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=221526 - Issue Tracking, Patch, Vendor Advisory
CPE cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other CWE-502
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8

Information

Published : 2003-10-07 04:00

Updated : 2024-01-25 02:14


NVD link : CVE-2003-0791

Mitre link : CVE-2003-0791

CVE.ORG link : CVE-2003-0791


JSON object : View

Products Affected

sco

  • openserver

mozilla

  • mozilla
CWE
CWE-502

Deserialization of Untrusted Data