First published: Thu Nov 13 2008(Updated: )
Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the protection mechanism for codebase principals and execute arbitrary script via the -moz-binding CSS property in a signed JAR file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=2.0<2.0.0.18 | |
Firefox | >=3.0<3.0.4 | |
Mozilla SeaMonkey | >=1.0<1.1.13 | |
Debian Linux | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5023 is classified as a moderate severity vulnerability due to its potential to execute arbitrary scripts.
The best way to fix CVE-2008-5023 is to update to versions Firefox 3.0.4 or later, Firefox 2.0.0.18 or later, or SeaMonkey 1.1.13 or later.
CVE-2008-5023 is associated with a vulnerability that allows remote attackers to bypass codebase principal protections.
CVE-2008-5023 affects Firefox versions before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey before 1.1.13.
CVE-2008-5023 impacts multiple platforms including Debian Linux 4.0 and various versions of Ubuntu Linux.