First published: Wed Dec 17 2008(Updated: )
Unspecified vulnerability in the session-restore feature in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19 allows remote attackers to bypass the same origin policy, inject content into documents associated with other domains, and conduct cross-site scripting (XSS) attacks via unknown vectors related to restoration of SessionStore data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=2.0<2.0.0.19 | |
Firefox | >=3.0<3.0.5 | |
Mozilla SeaMonkey | >=1.0<1.1.14 | |
Thunderbird | >=2.0<2.0.0.19 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Debian Linux | =5.0 | |
Debian Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5513 is considered a critical vulnerability due to its potential to allow cross-site scripting attacks.
To fix CVE-2008-5513, update Mozilla Firefox, SeaMonkey, or Thunderbird to the latest version that addresses the vulnerability.
CVE-2008-5513 affects Mozilla Firefox versions 3.x before 3.0.5 and 2.x before 2.0.0.19, as well as specific versions of SeaMonkey and Thunderbird.
CVE-2008-5513 can enable remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks.
There are no recommended workarounds for CVE-2008-5513; upgrading the software is the only effective mitigation.