CVE-2009-1837

Race condition in the NPObjWrapper_NewResolve function in modules/plugin/base/src/nsJSNPRuntime.cpp in xul.dll in Mozilla Firefox 3 before 3.0.11 might allow remote attackers to execute arbitrary code via a page transition during Java applet loading, related to a use-after-free vulnerability for memory associated with a destroyed Java object.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=503579 Issue Tracking
http://secunia.com/advisories/35431 Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2009/1572 Broken Link Vendor Advisory
http://secunia.com/secunia_research/2009-19/ Broken Link Vendor Advisory
http://secunia.com/advisories/34241 Broken Link Vendor Advisory
https://rhn.redhat.com/errata/RHSA-2009-1095.html Third Party Advisory
http://www.securityfocus.com/bid/35326 Broken Link Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=486269 Exploit Issue Tracking
http://www.mozilla.org/security/announce/2009/mfsa2009-28.html Vendor Advisory
http://secunia.com/advisories/35331 Broken Link Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html Mailing List
http://www.securitytracker.com/id?1022386 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35360 Broken Link Third Party Advisory VDB Entry
http://secunia.com/advisories/35468 Broken Link
http://www.debian.org/security/2009/dsa-1820 Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 Broken Link
http://secunia.com/advisories/35415 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 Broken Link
http://www.securityfocus.com/archive/1/504260/100/0/threaded Broken Link Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*

History

02 Feb 2024, 16:03

Type Values Removed Values Added
References (BID) http://www.securityfocus.com/bid/35326 - (BID) http://www.securityfocus.com/bid/35326 - Broken Link, Third Party Advisory, VDB Entry
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 - Broken Link
References (SECUNIA) http://secunia.com/advisories/35415 - (SECUNIA) http://secunia.com/advisories/35415 - Broken Link
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html - Mailing List
References (SECUNIA) http://secunia.com/advisories/34241 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/34241 - Broken Link, Vendor Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=503579 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=503579 - Issue Tracking
References (SECUNIA) http://secunia.com/advisories/35431 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/35431 - Broken Link, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2009/1572 - Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2009/1572 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/35331 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/35331 - Broken Link, Vendor Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 - Broken Link
References (BUGTRAQ) http://www.securityfocus.com/archive/1/504260/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/504260/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/35360 - (BID) http://www.securityfocus.com/bid/35360 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) http://secunia.com/secunia_research/2009-19/ - Vendor Advisory (MISC) http://secunia.com/secunia_research/2009-19/ - Broken Link, Vendor Advisory
References (REDHAT) https://rhn.redhat.com/errata/RHSA-2009-1095.html - (REDHAT) https://rhn.redhat.com/errata/RHSA-2009-1095.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/35468 - (SECUNIA) http://secunia.com/advisories/35468 - Broken Link
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html - Mailing List
References (DEBIAN) http://www.debian.org/security/2009/dsa-1820 - (DEBIAN) http://www.debian.org/security/2009/dsa-1820 - Mailing List, Third Party Advisory
References (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=486269 - Exploit (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=486269 - Exploit, Issue Tracking
References (SECTRACK) http://www.securitytracker.com/id?1022386 - (SECTRACK) http://www.securitytracker.com/id?1022386 - Broken Link, Third Party Advisory, VDB Entry
References (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 - (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 - Broken Link
CWE CWE-416
CPE cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 7.5
First Time Redhat enterprise Linux Desktop
Redhat
Fedoraproject
Debian
Redhat enterprise Linux Server Aus
Fedoraproject fedora
Redhat enterprise Linux Workstation
Debian debian Linux
Redhat enterprise Linux Eus
Redhat enterprise Linux Server
Redhat enterprise Linux

Information

Published : 2009-06-12 21:30

Updated : 2024-02-02 16:03


NVD link : CVE-2009-1837

Mitre link : CVE-2009-1837


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • enterprise_linux
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_server
  • enterprise_linux_server_aus
  • enterprise_linux_workstation

fedoraproject

  • fedora

mozilla

  • firefox
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-416

Use After Free