First published: Wed Dec 17 2008(Updated: )
Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL that redirects to the target resource, which generates an error if the target data does not have JavaScript syntax, which can be accessed using the window.onerror DOM API.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=2.0<2.0.0.19 | |
Firefox | >=3.0<3.0.5 | |
Mozilla SeaMonkey | >=1.0<1.1.14 | |
Thunderbird | >=2.0<2.0.0.19 | |
Ubuntu | =6.06 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Debian Linux | =5.0 | |
Debian Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5507 has a severity rating that allows remote attackers to bypass the same-origin policy.
To fix CVE-2008-5507, update Mozilla Firefox, Thunderbird, or SeaMonkey to versions above the vulnerable ones specified in the advisory.
CVE-2008-5507 affects Mozilla Firefox versions 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird before 2.0.0.19, and SeaMonkey before 1.1.14.
CVE-2008-5507 is associated with JavaScript URL redirection that allows for unauthorized data access from another domain.
CVE-2008-5507 is a remote vulnerability that can be exploited by attackers over the internet.