Vulnerability Note VU#466521

Mozilla JavaScript privilege escalation

Original Release date: 27 Mar 2008 | Last revised: 27 Mar 2008


Mozilla products contain multiple vulnerabilities that may allow a remote, unauthenticated attacker to execute arbitrary code.


Mozilla Firefox, Thunderbird, and SeaMonkey do not properly handle JavaScript, which may allow privilege escalation and execution of arbitrary code on an affected system.


Successful exploitation of this vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.


Apply an update

Mozilla Foundation has issued new versions of the affected products which address these vulnerabilities. Please see MFSA 2008-14 for more details.

Disabling JavaScript is an effective workaround for these vulnerabilities. It is strongly recommended that you disable JavaScript until a version containing patches for these vulnerabilities can be installed.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MozillaAffected-27 Mar 2008
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This document was written by Joseph Pruszynski.

Other Information


If you have feedback, comments, or additional information about this vulnerability, please send us email.