First published: Thu Nov 13 2008(Updated: )
Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=2.0<2.0.0.18 | |
Firefox | >=3.0<3.0.4 | |
Mozilla SeaMonkey | >=1.0<1.1.13 | |
Thunderbird | >=2.0<2.0.0.18 | |
Debian Linux | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5024 has been classified as a moderate severity vulnerability.
CVE-2008-5024 affects Mozilla Firefox versions prior to 3.0.4 and 2.0.0.18, Thunderbird versions prior to 2.0.0.18, and SeaMonkey versions prior to 1.1.13.
To fix CVE-2008-5024, update your affected software to the latest version that resolves this vulnerability.
CVE-2008-5024 allows remote attackers to conduct XML injection attacks via improperly escaped quote characters.
There are no specific workarounds mentioned for CVE-2008-5024, but using updated software is the best mitigation.