First published: Wed Sep 24 2008(Updated: )
Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=2.0.0.16 | |
Mozilla Firefox | =0.8 | |
Mozilla Firefox | =0.9 | |
Mozilla Firefox | =0.9-rc | |
Mozilla Firefox | =0.9.1 | |
Mozilla Firefox | =0.9.2 | |
Mozilla Firefox | =0.9.3 | |
Mozilla Firefox | =0.9_rc | |
Mozilla Firefox | =0.10 | |
Mozilla Firefox | =0.10.1 | |
Mozilla Firefox | =1.0 | |
Mozilla Firefox | =1.0.1 | |
Mozilla Firefox | =1.0.2 | |
Mozilla Firefox | =1.0.3 | |
Mozilla Firefox | =1.0.4 | |
Mozilla Firefox | =1.0.5 | |
Mozilla Firefox | =1.0.6 | |
Mozilla Firefox | =1.0.7 | |
Mozilla Firefox | =1.0.8 | |
Mozilla Firefox | =1.5 | |
Mozilla Firefox | =1.5-beta1 | |
Mozilla Firefox | =1.5-beta2 | |
Mozilla Firefox | =1.5.0.1 | |
Mozilla Firefox | =1.5.0.2 | |
Mozilla Firefox | =1.5.0.3 | |
Mozilla Firefox | =1.5.0.4 | |
Mozilla Firefox | =1.5.0.5 | |
Mozilla Firefox | =1.5.0.6 | |
Mozilla Firefox | =1.5.0.7 | |
Mozilla Firefox | =1.5.0.8 | |
Mozilla Firefox | =1.5.0.9 | |
Mozilla Firefox | =1.5.0.10 | |
Mozilla Firefox | =1.5.0.11 | |
Mozilla Firefox | =1.5.0.12 | |
Mozilla Firefox | =1.5.1 | |
Mozilla Firefox | =1.5.2 | |
Mozilla Firefox | =1.5.3 | |
Mozilla Firefox | =1.5.4 | |
Mozilla Firefox | =1.5.5 | |
Mozilla Firefox | =1.5.6 | |
Mozilla Firefox | =1.5.7 | |
Mozilla Firefox | =1.5.8 | |
Mozilla Firefox | =1.8 | |
Mozilla Firefox | =2.0 | |
Mozilla Firefox | =2.0.0.1 | |
Mozilla Firefox | =2.0.0.10 | |
Mozilla Firefox | =2.0.0.11 | |
Mozilla Firefox | =2.0.0.12 | |
Mozilla Firefox | =2.0.0.13 | |
Mozilla Firefox | =2.0.0.14 | |
Mozilla Firefox | =2.0.0.15 | |
Mozilla SeaMonkey | ||
Mozilla SeaMonkey | <=1.1.11 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.7 | |
Mozilla SeaMonkey | =1.0.8 | |
Mozilla SeaMonkey | =1.0.9 | |
Mozilla SeaMonkey | =1.0.99 | |
Mozilla SeaMonkey | =1.1 | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =1.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0016 has a severity rating that allows remote attackers to execute arbitrary code via a crafted UTF-8 URL.
To mitigate CVE-2008-0016, users should upgrade to Mozilla Firefox version 2.0.0.17 or later, or SeaMonkey version 1.1.12 or later.
CVE-2008-0016 affects Mozilla Firefox versions prior to 2.0.0.17.
SeaMonkey versions prior to 1.1.12 are vulnerable to CVE-2008-0016.
In CVE-2008-0016, a stack-based buffer overflow occurs when the application improperly processes a crafted URL, leading to potential execution of malicious code.