First published: Mon Apr 18 2005(Updated: )
The native implementations of InstallTrigger and other functions in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 do not properly verify the types of objects being accessed, which causes the Javascript interpreter to continue execution at the wrong memory address, which may allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code by passing objects of the wrong type.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =0.8 | |
Mozilla Mozilla | =1.7-alpha | |
Mozilla Mozilla | =1.7-rc1 | |
Mozilla Mozilla | =1.5-rc2 | |
Mozilla Firefox | =1.0.2 | |
Mozilla Mozilla | =1.7 | |
Mozilla Firefox | =0.9.1 | |
Mozilla Mozilla | =1.7.5 | |
Mozilla Firefox | =0.10.1 | |
Mozilla Firefox | =0.9 | |
Mozilla Mozilla | =1.6-beta | |
Mozilla Mozilla | =1.4.1 | |
Mozilla Mozilla | =1.5-alpha | |
Mozilla Mozilla | =1.5-rc1 | |
Mozilla Mozilla | =1.3 | |
Mozilla Firefox | =1.0 | |
Mozilla Mozilla | =1.7-beta | |
Mozilla Firefox | =1.0.1 | |
Mozilla Mozilla | =1.4 | |
Mozilla Mozilla | =1.5 | |
Mozilla Mozilla | =1.7.6 | |
Mozilla Mozilla | =1.7.1 | |
Mozilla Firefox | =0.9.3 | |
Mozilla Mozilla | =1.4-alpha | |
Mozilla Mozilla | =1.5.1 | |
Mozilla Firefox | =0.9.2 | |
Mozilla Mozilla | =1.7.2 | |
Mozilla Firefox | =0.9-rc | |
Mozilla Mozilla | =1.7-rc3 | |
Mozilla Mozilla | =1.7-rc2 | |
Mozilla Firefox | =0.10 | |
Mozilla Mozilla | =1.7.3 | |
Mozilla Mozilla | =1.6-alpha | |
Mozilla Mozilla | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.