CVE-2007-0994

A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc Broken Link
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc Broken Link
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 Exploit Patch Issue Tracking Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html Broken Link
http://secunia.com/advisories/24384 Third Party Advisory
http://secunia.com/advisories/24395 Third Party Advisory
http://secunia.com/advisories/24455 Third Party Advisory
http://secunia.com/advisories/24457 Third Party Advisory
http://secunia.com/advisories/24650 Third Party Advisory
http://secunia.com/advisories/25588 Third Party Advisory
http://securitytracker.com/id?1017726 Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 Mailing List Third Party Advisory
http://www.debian.org/security/2007/dsa-1336 Third Party Advisory
http://www.mozilla.org/security/announce/2007/mfsa2007-09.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0078.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html Third Party Advisory
http://www.securityfocus.com/bid/22826 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/0823 Third Party Advisory
https://issues.rpath.com/browse/RPL-1103 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2007-03-06 00:19

Updated : 2023-12-10 10:40


NVD link : CVE-2007-0994

Mitre link : CVE-2007-0994

CVE.ORG link : CVE-2007-0994


JSON object : View

Products Affected

mozilla

  • seamonkey
  • firefox

debian

  • debian_linux
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')