First published: Thu Nov 13 2008(Updated: )
The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | >=2.0<2.0.0.18 | |
Mozilla Firefox | >=3.0<3.0.4 | |
Mozilla SeaMonkey | >=1.0<1.1.13 | |
Mozilla Thunderbird | >=2.0<2.0.0.18 | |
Debian GNU/Linux | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Mozilla Firefox and Thunderbird | >=2.0<2.0.0.18 | |
Mozilla Firefox and Thunderbird | >=3.0<3.0.4 | |
Mozilla Firefox and Thunderbird | >=2.0<2.0.0.18 | |
Debian | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5018 has a medium severity level due to its potential to cause denial of service by crashing the affected applications.
To mitigate CVE-2008-5018, upgrade to the latest version of Mozilla Firefox, Thunderbird, or SeaMonkey that is not affected.
CVE-2008-5018 affects Mozilla Firefox 3.x before 3.0.4, 2.x before 2.0.0.18, Mozilla Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13.
CVE-2008-5018 is a denial of service vulnerability related to insufficient class checking in the JavaScript engine.
Yes, CVE-2008-5018 can be exploited remotely, allowing attackers to crash the application by sending specially crafted input.