First published: Thu Nov 13 2008(Updated: )
The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | >=2.0<2.0.0.18 | |
Mozilla Firefox | >=3.0<3.0.4 | |
Mozilla SeaMonkey | >=1.0<1.1.13 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =5.0 | |
Mozilla Firefox and Thunderbird | >=2.0<2.0.0.18 | |
Mozilla Firefox and Thunderbird | >=3.0<3.0.4 | |
Debian | =5.0 | |
Debian | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0017 is classified as a high severity vulnerability due to its potential to cause a denial of service and possible arbitrary code execution.
To fix CVE-2008-0017, update your Firefox or SeaMonkey browser to the latest version available that addresses this vulnerability.
CVE-2008-0017 affects Firefox versions before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey before 1.1.13.
Yes, CVE-2008-0017 can be exploited remotely by attackers to crash affected browsers or potentially execute arbitrary code.
CVE-2008-0017 affects various operating systems, including multiple versions of Ubuntu Linux and Debian Linux, alongside specific versions of Firefox and SeaMonkey.