First published: Thu Nov 13 2008(Updated: )
The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=2.0<2.0.0.18 | |
Firefox | >=3.0<3.0.4 | |
Mozilla SeaMonkey | >=1.0<1.1.13 | |
Thunderbird | >=2.0<2.0.0.18 | |
Debian Linux | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5022 has a high severity rating due to its potential for remote exploitation and bypassing of the same-origin policy.
To fix CVE-2008-5022, upgrade your Mozilla Firefox, Thunderbird, or SeaMonkey to the latest versions that have addressed this vulnerability.
CVE-2008-5022 affects Firefox versions before 3.0.4, Thunderbird versions before 2.0.0.18, SeaMonkey versions before 1.1.13, and several older Ubuntu and Debian Linux versions.
CVE-2008-5022 can allow remote attackers to execute arbitrary scripts, posing significant risks to users' data and privacy.
There is no documented workaround for CVE-2008-5022; the only effective solution is to update to the fixed versions of the affected software.