National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2008-0413 Detail

Description

The JavaScript engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via (1) a large switch statement, (2) certain uses of watch and eval, (3) certain uses of the mousedown event listener, and other vectors.

Source:  MITRE      Last Modified:  02/08/2008

Quick Info

CVE Dictionary Entry:
CVE-2008-0413
Original release date:
02/08/2008
Last revised:
09/28/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
9.3 HIGH
Vector:
(AV:N/AC:M/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://browser.netscape.com/releasenotes/ External Source CONFIRM http://browser.netscape.com/releasenotes/
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html External Source SUSE SUSE-SA:2008:008
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.445399 External Source SLACKWARE SSA:2008-061-01
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 External Source SUNALERT 238492
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 External Source SUNALERT 239546
http://wiki.rpath.com/Advisories:rPSA-2008-0051 External Source CONFIRM http://wiki.rpath.com/Advisories:rPSA-2008-0051
http://wiki.rpath.com/Advisories:rPSA-2008-0093 External Source CONFIRM http://wiki.rpath.com/Advisories:rPSA-2008-0093
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093 External Source CONFIRM http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093
http://www.debian.org/security/2008/dsa-1484 External Source DEBIAN DSA-1484
http://www.debian.org/security/2008/dsa-1485 External Source DEBIAN DSA-1485
http://www.debian.org/security/2008/dsa-1489 External Source DEBIAN DSA-1489
http://www.debian.org/security/2008/dsa-1506 External Source DEBIAN DSA-1506
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml External Source GENTOO GLSA-200805-18
http://www.mandriva.com/security/advisories?name=MDVSA-2008:048 External Source MANDRIVA MDVSA-2008:048
http://www.mandriva.com/security/advisories?name=MDVSA-2008:062 External Source MANDRIVA MDVSA-2008:062
http://www.mozilla.org/security/announce/2008/mfsa2008-01.html External Source CONFIRM http://www.mozilla.org/security/announce/2008/mfsa2008-01.html
http://www.redhat.com/support/errata/RHSA-2008-0103.html External Source REDHAT RHSA-2008:0103
http://www.redhat.com/support/errata/RHSA-2008-0104.html External Source REDHAT RHSA-2008:0104
http://www.redhat.com/support/errata/RHSA-2008-0105.html External Source REDHAT RHSA-2008:0105
http://www.securityfocus.com/archive/1/archive/1/487826/100/0/threaded External Source BUGTRAQ 20080209 rPSA-2008-0051-1 firefox
http://www.securityfocus.com/archive/1/archive/1/488002/100/0/threaded External Source BUGTRAQ 20080212 FLEA-2008-0001-1 firefox
http://www.securityfocus.com/archive/1/archive/1/488971/100/0/threaded External Source BUGTRAQ 20080229 rPSA-2008-0093-1 thunderbird
http://www.securityfocus.com/bid/27683 External Source BID 27683
http://www.securitytracker.com/id?1019321 External Source SECTRACK 1019321
http://www.ubuntu.com/usn/usn-576-1 External Source UBUNTU USN-576-1
http://www.ubuntu.com/usn/usn-582-1 External Source UBUNTU USN-582-1
http://www.ubuntu.com/usn/usn-582-2 External Source UBUNTU USN-582-2
http://www.vupen.com/english/advisories/2008/0453/references External Source VUPEN ADV-2008-0453
http://www.vupen.com/english/advisories/2008/0454/references External Source VUPEN ADV-2008-0454
http://www.vupen.com/english/advisories/2008/0627/references External Source VUPEN ADV-2008-0627
http://www.vupen.com/english/advisories/2008/1793/references External Source VUPEN ADV-2008-1793
http://www.vupen.com/english/advisories/2008/2091/references External Source VUPEN ADV-2008-2091
https://bugzilla.mozilla.org/buglist.cgi?bug_id=407720,390597,373344,398085,406572,391028,406036,402087 External Source CONFIRM https://bugzilla.mozilla.org/buglist.cgi?bug_id=407720,390597,373344,398085,406572,391028,406036,402087
https://issues.rpath.com/browse/RPL-1995 External Source CONFIRM https://issues.rpath.com/browse/RPL-1995
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10385 External Source OVAL oval:org.mitre.oval:def:10385
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html External Source FEDORA FEDORA-2008-1435
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html External Source FEDORA FEDORA-2008-1459
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html External Source FEDORA FEDORA-2008-1535
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html External Source FEDORA FEDORA-2008-2060
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html External Source FEDORA FEDORA-2008-2118

References to Check Content

Identifier:
oval:org.mitre.oval:def:10385
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:10385

Technical Details

Vulnerability Type (View All)

  • Resource Management Errors (CWE-399)

Change History 2 change records found - show changes