First published: Wed Sep 24 2008(Updated: )
Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <2.0.0.17 | |
Mozilla Firefox | >=3.0<3.0.2 | |
Mozilla SeaMonkey | <1.1.12 | |
Mozilla Thunderbird | <2.0.0.17 | |
Debian GNU/Linux | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Mozilla Firefox and Thunderbird | <2.0.0.17 | |
Mozilla Firefox and Thunderbird | >=3.0<3.0.2 | |
Mozilla Firefox and Thunderbird | <2.0.0.17 | |
Debian | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4062 has a high severity rating due to its potential to cause denial of service and remote code execution.
To fix CVE-2008-4062, update Mozilla Firefox, Thunderbird, or SeaMonkey to the latest version available.
CVE-2008-4062 affects Mozilla Firefox versions before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12.
CVE-2008-4062 allows remote attackers to cause memory corruption, application crashes, and potentially execute arbitrary code.
No, it is not safe to use affected software until it has been updated to mitigate the vulnerabilities outlined in CVE-2008-4062.