First published: Wed Dec 17 2008(Updated: )
Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | >=2.0<2.0.0.19 | |
Mozilla Firefox | >=3.0<3.0.5 | |
Mozilla SeaMonkey | >=1.0<1.1.14 | |
Mozilla Thunderbird | >=2.0<2.0.0.19 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =5.0 | |
Mozilla Firefox and Thunderbird | >=2.0<2.0.0.19 | |
Mozilla Firefox and Thunderbird | >=3.0<3.0.5 | |
Mozilla Firefox and Thunderbird | >=2.0<2.0.0.19 | |
Ubuntu | =6.06 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Debian | =5.0 | |
Debian | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5511 is classified as a high severity vulnerability due to its potential to allow cross-site scripting (XSS) attacks.
To fix CVE-2008-5511, update affected software such as Mozilla Firefox, Thunderbird, or SeaMonkey to the latest versions provided by the vendors.
CVE-2008-5511 affects Mozilla Firefox versions before 3.0.5, Thunderbird versions before 2.0.0.19, and SeaMonkey versions before 1.1.14.
CVE-2008-5511 poses a risk of allowing remote attackers to bypass the same origin policy, leading to potential data theft or manipulation.
While CVE-2008-5511 is an older vulnerability, it remains a threat for any systems that have not been updated and still use the affected versions.