First published: Wed Dec 17 2008(Updated: )
The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=2.0<2.0.0.19 | |
Firefox | >=3.0<3.0.5 | |
Mozilla SeaMonkey | >=1.0<1.1.14 | |
Thunderbird | >=2.0<2.0.0.19 | |
Ubuntu | =6.06 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Debian Linux | =5.0 | |
Debian Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5500 is classified as a denial of service vulnerability that can cause application crashes.
To mitigate CVE-2008-5500, update to the latest versions of Mozilla Firefox, Thunderbird, or SeaMonkey.
CVE-2008-5500 affects Mozilla Firefox versions before 3.0.5 and 2.0.0.19, Thunderbird versions before 2.0.0.19, and SeaMonkey versions before 1.1.14.
Yes, remote attackers can exploit CVE-2008-5500 to trigger application crashes.
CVE-2008-5500 enables denial of service attacks that may lead to application crashes and potential memory corruption.