First published: Wed Jul 13 2005(Updated: )
Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties ("XHTML node spoofing").
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =0.8 | |
Firefox | =0.9 | |
Firefox | =0.9-rc | |
Firefox | =0.9.1 | |
Firefox | =0.9.2 | |
Firefox | =0.9.3 | |
Firefox | =0.10 | |
Firefox | =0.10.1 | |
Firefox | =1.0 | |
Firefox | =1.0.1 | |
Firefox | =1.0.2 | |
Firefox | =1.0.3 | |
Firefox | =1.0.4 | |
Mozilla Firefox | =1.3 | |
Mozilla Firefox | =1.4 | |
Mozilla Firefox | =1.4-alpha | |
Mozilla Firefox | =1.4.1 | |
Mozilla Firefox | =1.5 | |
Mozilla Firefox | =1.5-alpha | |
Mozilla Firefox | =1.5-rc1 | |
Mozilla Firefox | =1.5-rc2 | |
Mozilla Firefox | =1.5.1 | |
Mozilla Firefox | =1.6 | |
Mozilla Firefox | =1.6-alpha | |
Mozilla Firefox | =1.6-beta | |
Mozilla Firefox | =1.7 | |
Mozilla Firefox | =1.7-alpha | |
Mozilla Firefox | =1.7-beta | |
Mozilla Firefox | =1.7-rc1 | |
Mozilla Firefox | =1.7-rc2 | |
Mozilla Firefox | =1.7-rc3 | |
Mozilla Firefox | =1.7.1 | |
Mozilla Firefox | =1.7.2 | |
Mozilla Firefox | =1.7.3 | |
Mozilla Firefox | =1.7.5 | |
Mozilla Firefox | =1.7.6 | |
Mozilla Firefox | =1.7.7 | |
Mozilla Firefox | =1.7.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2269 has been rated as high severity due to the potential for remote code execution.
To fix CVE-2005-2269, upgrade your Firefox or Mozilla version to 1.0.5 or higher, or 1.7.9 or higher for Mozilla.
CVE-2005-2269 affects multiple versions of Firefox, Mozilla, and Netscape browsers before the specified patched versions.
Yes, CVE-2005-2269 can be exploited remotely by attackers to execute arbitrary scripts or code.
Exploitation of CVE-2005-2269 can lead to unauthorized access, data exfiltration, or other malicious activities.