CVE-2008-0016

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

References

http://download.novell.com/Download?buildid=WZXONb-tqBw~

http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html

http://secunia.com/advisories/31984

http://secunia.com/advisories/31985

http://secunia.com/advisories/32010

http://secunia.com/advisories/32012

http://secunia.com/advisories/32042

http://secunia.com/advisories/32044

http://secunia.com/advisories/32082

http://secunia.com/advisories/32092

http://secunia.com/advisories/32144

http://secunia.com/advisories/32185

http://secunia.com/advisories/32196

http://secunia.com/advisories/32845

http://secunia.com/advisories/33433

http://secunia.com/advisories/33434

http://secunia.com/advisories/34501

http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422

http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232

http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123

http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1

http://www.debian.org/security/2008/dsa-1649

http://www.debian.org/security/2008/dsa-1669

http://www.debian.org/security/2009/dsa-1696

http://www.debian.org/security/2009/dsa-1697

http://www.mandriva.com/security/advisories?name=MDVSA-2008:205

http://www.mandriva.com/security/advisories?name=MDVSA-2008:206

http://www.mozilla.org/security/announce/2008/mfsa2008-37.html

http://www.redhat.com/support/errata/RHSA-2008-0882.html

http://www.redhat.com/support/errata/RHSA-2008-0908.html

http://www.securityfocus.com/bid/31397

http://www.securitytracker.com/id?1020913

http://www.ubuntu.com/usn/usn-645-1

http://www.ubuntu.com/usn/usn-645-2

http://www.vupen.com/english/advisories/2008/2661

http://www.vupen.com/english/advisories/2009/0977

https://bugzilla.mozilla.org/show_bug.cgi?id=443288

https://bugzilla.mozilla.org/show_bug.cgi?id=451617

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11579

https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html

https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html

Details

Source: MITRE

Published: 2008-09-24

Updated: 2017-09-29

Type: CWE-119

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* versions up to 2.0.0.16 (inclusive)

cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* versions up to 1.1.11 (inclusive)

Tenable Plugins

View all (43 total)

IDNameProductFamilySeverity
67754Oracle Linux 4 : thunderbird (ELSA-2008-0908)NessusOracle Linux Local Security Checks
critical
67745Oracle Linux 3 / 4 : seamonkey (ELSA-2008-0882)NessusOracle Linux Local Security Checks
critical
65110Ubuntu 6.06 LTS : firefox vulnerabilities (USN-645-2)NessusUbuntu Local Security Checks
critical
63402GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)NessusGentoo Local Security Checks
critical
60478Scientific Linux Security Update : thunderbird on SL4.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
critical
60476Scientific Linux Security Update : seamonkey on SL3.x, SL4.x i386/x86_64NessusScientific Linux Local Security Checks
critical
40130openSUSE Security Update : seamonkey (seamonkey-238)NessusSuSE Local Security Checks
critical
40071openSUSE Security Update : mozilla-xulrunner181 (mozilla-xulrunner181-237)NessusSuSE Local Security Checks
critical
39893openSUSE Security Update : MozillaThunderbird (MozillaThunderbird-236)NessusSuSE Local Security Checks
critical
38073Ubuntu 8.04 LTS : firefox-3.0, xulrunner-1.9 regression (USN-645-3)NessusUbuntu Local Security Checks
critical
37308Mandriva Linux Security Advisory : mozilla-thunderbird (MDVSA-2008:206)NessusMandriva Local Security Checks
critical
36823Mandriva Linux Security Advisory : mozilla-firefox (MDVSA-2008:205)NessusMandriva Local Security Checks
critical
36243Ubuntu 7.04 / 7.10 / 8.04 LTS : firefox, firefox-3.0, xulrunner-1.9 vulnerabilities (USN-645-1)NessusUbuntu Local Security Checks
critical
35314Debian DSA-1697-1 : iceape - several vulnerabilitiesNessusDebian Local Security Checks
critical
35313Debian DSA-1696-1 : icedove - several vulnerabilitiesNessusDebian Local Security Checks
critical
34938Debian DSA-1669-1 : xulrunner - several vulnerabilitiesNessusDebian Local Security Checks
critical
34837Fedora 9 : thunderbird-2.0.0.18-1.fc9 (2008-9859)NessusFedora Local Security Checks
critical
34836Fedora 8 : thunderbird-2.0.0.18-1.fc8 (2008-9807)NessusFedora Local Security Checks
critical
34371Debian DSA-1649-1 : iceweasel - several vulnerabilitiesNessusDebian Local Security Checks
critical
34367openSUSE 10 Security Update : mozilla-xulrunner181 (mozilla-xulrunner181-5656)NessusSuSE Local Security Checks
critical
34366SuSE 10 Security Update : Mozilla (ZYPP Patch Number 5654)NessusSuSE Local Security Checks
critical
34360openSUSE 10 Security Update : seamonkey (seamonkey-5657)NessusSuSE Local Security Checks
critical
34345openSUSE 10 Security Update : MozillaThunderbird (MozillaThunderbird-5655)NessusSuSE Local Security Checks
critical
34339CentOS 4 / 5 : thunderbird (CESA-2008:0908)NessusCentOS Local Security Checks
critical
34330RHEL 4 / 5 : thunderbird (RHSA-2008:0908)NessusRed Hat Local Security Checks
critical
34319SuSE 10 Security Update : MozillaFirefox (ZYPP Patch Number 5644)NessusSuSE Local Security Checks
critical
34318openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-5640)NessusSuSE Local Security Checks
critical
34309Fedora 9 : seamonkey-1.1.12-1.fc9 (2008-8429)NessusFedora Local Security Checks
critical
34307Fedora 8 : seamonkey-1.1.12-1.fc8 (2008-8401)NessusFedora Local Security Checks
critical
34300Slackware 10.2 / 11.0 / 12.0 / 12.1 / current : mozilla-thunderbird (SSA:2008-270-01)NessusSlackware Local Security Checks
critical
4696Mozilla Thunderbird < 2.0.0.17 Multiple VulnerabilitiesNessus Network MonitorSMTP Clients
medium
34296Slackware 11.0 / 12.0 / 12.1 / current : seamonkey (SSA:2008-269-02)NessusSlackware Local Security Checks
critical
34295Slackware 10.2 / 11.0 / 12.0 / 12.1 / current : mozilla-firefox (SSA:2008-269-01)NessusSlackware Local Security Checks
critical
34294Mozilla Thunderbird < 2.0.0.17 Multiple VulnerabilitiesNessusWindows
high
34278CentOS 3 / 4 : seamonkey (CESA-2008:0882)NessusCentOS Local Security Checks
critical
4693SeaMonkey < 1.1.12 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
4692Mozilla Firefox < 2.0.0.17 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
34275RHEL 2.1 / 3 / 4 : seamonkey (RHSA-2008:0882)NessusRed Hat Local Security Checks
critical
34270FreeBSD : mozilla -- multiple vulnerabilities (2273879e-8a2f-11dd-a6fe-0030843d3802)NessusFreeBSD Local Security Checks
critical
34269SeaMonkey < 1.1.12 Multiple VulnerabilitiesNessusWindows
high
34268Firefox < 2.0.0.17 Multiple VulnerabilitiesNessusWindows
high
801289Mozilla Thunderbird < 2.0.0.17 Multiple VulnerabilitiesLog Correlation EngineSMTP Clients
high
800877SeaMonkey < 1.1.12 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high