The Script.prototype.freeze/thaw functionality in Mozilla 1.4 and earlier allows attackers to execute native methods by modifying the string used as input to the script.thaw JavaScript function, which is then deserialized and executed.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=221526 | Issue Tracking Patch Vendor Advisory |
http://secunia.com/advisories/11103/ | URL Repurposed |
http://www.securityfocus.com/advisories/6979 | Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory |
http://www.securityfocus.com/bid/9322 | Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory |
http://www.osvdb.org/8390 | Broken Link Patch Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 | Broken Link |
Configurations
History
25 Jan 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CWE | CWE-502 | |
References | (BID) http://www.securityfocus.com/bid/9322 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/11103/ - URL Repurposed | |
References | (OSVDB) http://www.osvdb.org/8390 - Broken Link, Patch, Vendor Advisory | |
References | (MISC) https://bugzilla.mozilla.org/show_bug.cgi?id=221526 - Issue Tracking, Patch, Vendor Advisory | |
References | (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 - Broken Link | |
References | (SCO) http://www.securityfocus.com/advisories/6979 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
CPE | cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:* |
Information
Published : 2003-10-07 04:00
Updated : 2024-01-25 02:14
NVD link : CVE-2003-0791
Mitre link : CVE-2003-0791
JSON object : View
Products Affected
sco
- openserver
mozilla
- mozilla
CWE
CWE-502
Deserialization of Untrusted Data