Vulnerability Note VU#609956

Mozilla products vulnerable to memory corruption in the JavaScript engine

Original Release date: 31 May 2007 | Last revised: 20 Jun 2007

Overview

A vulnerability in the Mozilla JavaScript engine may allow execution of arbitrary code or denial of service.

Description

The Mozilla JavaScript engine contains an unspecified vulnerability that may result in memory corruption. The impact of this memory corruption is unclear. According to Mozilla Foundation Security Advisory 2007-12:

    Some of these crashes that showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

Information about the individual bug reports addressed in this update can be found in Mozilla Foundation Security Advisory 2007-12.

Impact

Potential consequences include remote execution of arbitrary code and denial of service.

Solution

Upgrade
These vulnerabilities are addressed in Firefox 2.0.0.4, Firefox 1.5.0.12, Thunderbird 2.0.0.4, Thunderbird 1.5.0.12, SeaMonkey 1.0.9, SeaMonkey 1.1.2.

Users that are unable to update should consider the following workaround:


Disable JavaScript

For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MozillaAffected-31 May 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

These vulnerabilities were reported in Mozilla Foundation Security Advisory 2007-12. Mozilla credits Brendan Eich, Igor Bukanov, Jesse Ruderman, moz_bug_r_a4 and Wladimir Palant with reporting these issues.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2007-2868
  • Date Public: 31 May 2007
  • Date First Published: 31 May 2007
  • Date Last Updated: 20 Jun 2007
  • Severity Metric: 8.19
  • Document Revision: 35

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.