First published: Tue Mar 06 2007(Updated: )
A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=1.5<1.5.0.10 | |
Firefox | >=2.0<2.0.0.2 | |
Mozilla SeaMonkey | >=1.1<1.1.1 | |
Mozilla SeaMonkey | >=1.0<1.0.8 | |
Debian Linux | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0994 has been classified as critical due to its ability to allow remote attackers to execute arbitrary JavaScript.
To fix CVE-2007-0994, users should update Mozilla Firefox to version 2.0.0.2 or later, or SeaMonkey to version 1.1.1 or later.
CVE-2007-0994 affects Mozilla Firefox versions prior to 2.0.0.2 and 1.x prior to 1.5.0.10, and SeaMonkey versions prior to 1.1.1 and 1.0.8.
Yes, CVE-2007-0994 can affect Debian GNU/Linux versions specifically version 3.1.
CVE-2007-0994 exploits javascript: URIs in img, link, or style tags within HTML mail messages.