First published: Mon Feb 26 2007(Updated: )
The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=1.5<1.5.0.10 | |
Firefox | >=2.0<2.0.0.2 | |
Mozilla SeaMonkey | <1.0.8 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =5.10 | |
Debian Linux | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0778 has a moderate severity rating due to its potential to leak sensitive information.
To fix CVE-2007-0778, update Mozilla Firefox to version 1.5.0.10 or later, or upgrade to version 2.0.0.2 or later.
CVE-2007-0778 affects Mozilla Firefox versions prior to 1.5.0.10 and 2.x versions prior to 2.0.0.2.
In addition to Firefox, SeaMonkey versions before 1.0.8 and specific versions of Ubuntu and Debian Linux are also impacted by CVE-2007-0778.
CVE-2007-0778 could allow remote attackers to exploit hash collisions to obtain sensitive information or facilitate further attacks.