First published: Wed Sep 24 2008(Updated: )
The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | =1.1.10 | |
Mozilla SeaMonkey | ||
Thunderbird | =1.5.0.7 | |
Firefox | =0.9_rc | |
Thunderbird | =0.6 | |
Mozilla SeaMonkey | =1.0.3 | |
Firefox | =0.8 | |
Firefox | =2.0.0.12 | |
Thunderbird | =0.7.2 | |
Firefox | =1.5-beta2 | |
Thunderbird | =2.0.0.4 | |
Firefox | =1.5.2 | |
Mozilla SeaMonkey | =1.0.1 | |
Thunderbird | =2.0.0.6 | |
Mozilla SeaMonkey | =1.0.6 | |
Firefox | =1.5.0.6 | |
Firefox | =1.8 | |
Mozilla SeaMonkey | =1.0.9 | |
Thunderbird | =0.3 | |
Firefox | =1.5.0.10 | |
Firefox | =1.5.0.3 | |
Thunderbird | =0.2 | |
Mozilla SeaMonkey | =1.0 | |
Thunderbird | =2.0_.5 | |
Thunderbird | =1.0.7 | |
Firefox | =1.5.0.11 | |
Firefox | <=2.0.0.16 | |
Mozilla SeaMonkey | =1.0.99 | |
Thunderbird | =2.0.0.9 | |
Firefox | =1.5.4 | |
Thunderbird | <=2.0.0.16 | |
Mozilla SeaMonkey | =1.0.7 | |
Firefox | =1.0.2 | |
Mozilla SeaMonkey | =1.0-beta | |
Thunderbird | =2.0_.12 | |
Thunderbird | =2.0.0.15 | |
Firefox | =1.5-beta1 | |
Thunderbird | =2.0.0.8 | |
Thunderbird | =1.7.1 | |
Thunderbird | =2.0_8 | |
Firefox | =1.5 | |
Thunderbird | =1.5.0.3 | |
Firefox | =0.9.1 | |
Thunderbird | =1.5.0.10 | |
Firefox | =1.0.4 | |
Firefox | =1.0.7 | |
Thunderbird | =1.5.0.6 | |
Mozilla SeaMonkey | =1.1 | |
Firefox | =0.10.1 | |
Thunderbird | =1.0 | |
Thunderbird | =2.0.0.3 | |
Firefox | =0.9 | |
Thunderbird | =1.0.1 | |
Thunderbird | =1.5-beta2 | |
Firefox | =1.5.6 | |
Thunderbird | =2.0.0.2 | |
Thunderbird | ||
Firefox | =2.0.0.15 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.8 | |
Thunderbird | =1.0.2 | |
Thunderbird | =2.0.0.0 | |
Firefox | =1.0 | |
Mozilla SeaMonkey | =1.1.1 | |
Firefox | =1.5.0.7 | |
Thunderbird | =2.0.0.12 | |
Firefox | =2.0 | |
Thunderbird | =1.5 | |
Firefox | =1.0.1 | |
Thunderbird | =1.5.0.2 | |
Firefox | =2.0.0.14 | |
Thunderbird | =2.0.0.13 | |
Mozilla SeaMonkey | <=1.1.11 | |
Mozilla SeaMonkey | =1.0.5 | |
Thunderbird | =2.0_.9 | |
Thunderbird | =1.5.0.8 | |
Thunderbird | =2.0.0.14 | |
Firefox | =1.5.0.8 | |
Thunderbird | =0.5 | |
Thunderbird | =1.0.4 | |
Thunderbird | =1.5.2 | |
Firefox | =1.5.0.9 | |
Firefox | =1.5.0.5 | |
Firefox | =1.5.7 | |
Firefox | =1.5.0.12 | |
Thunderbird | =1.5.0.9 | |
Thunderbird | =1.5.0.11 | |
Thunderbird | =0.9 | |
Thunderbird | =1.0.3 | |
Thunderbird | =2.0.0.11 | |
Thunderbird | =2.0_.13 | |
Firefox | =2.0.0.11 | |
Firefox | =1.5.0.2 | |
Firefox | =1.0.3 | |
Firefox | =1.5.1 | |
Thunderbird | =2.0_.14 | |
Thunderbird | =0.7.3 | |
Firefox | =0.9.3 | |
Firefox | =2.0.0.13 | |
Thunderbird | =0.4 | |
Mozilla SeaMonkey | =1.0 | |
Thunderbird | =1.5.1 | |
Thunderbird | =0.7 | |
Firefox | =2.0.0.1 | |
Thunderbird | =1.0.6 | |
Thunderbird | =1.0.5-beta | |
Thunderbird | =2.0.0.5 | |
Thunderbird | =1.7.3 | |
Mozilla SeaMonkey | =1.0.4 | |
Firefox | =1.5.5 | |
Firefox | =0.9.2 | |
Thunderbird | =2.0.0.1 | |
Thunderbird | =1.5.0.1 | |
Thunderbird | =2.0_.4 | |
Thunderbird | =1.0.8 | |
Thunderbird | =0.1 | |
Firefox | =0.9-rc | |
Firefox | =1.5.8 | |
Firefox | =1.5.3 | |
Thunderbird | =0.7.1 | |
Thunderbird | =1.0.5 | |
Thunderbird | =0.8 | |
Firefox | =1.5.0.4 | |
Firefox | =1.5.0.1 | |
Firefox | =0.10 | |
Thunderbird | =2.0_.6 | |
Firefox | =1.0.5 | |
Firefox | =2.0.0.10 | |
Firefox | =1.0.6 | |
Thunderbird | =1.5.0.4 | |
Firefox | =1.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3835 has a severity rating that indicates it allows remote code execution due to Same Origin Policy bypass.
To fix CVE-2008-3835, upgrade to a version of Firefox, Thunderbird, or SeaMonkey that is 2.0.0.17 or newer.
CVE-2008-3835 affects Mozilla Firefox versions prior to 2.0.0.17, Thunderbird versions before 2.0.0.17, and SeaMonkey versions prior to 1.1.12.
CVE-2008-3835 exploits the nsXMLDocument::OnChannelRedirect function to execute arbitrary JavaScript code remotely.
Yes, CVE-2008-3835 can lead to data breaches as it allows execution of arbitrary JavaScript which could access sensitive information.