First published: Mon Aug 24 2009(Updated: )
Mozilla Firefox 3.0.6 through 3.0.13, and 3.5.x, allows remote attackers to cause a denial of service (CPU consumption) via JavaScript code with a long string value for the hash property (aka location.hash), a related issue to CVE-2008-5715.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =3.0.6 | |
Mozilla Firefox | =3.0.7 | |
Mozilla Firefox | =3.0.8 | |
Mozilla Firefox | =3.0.9 | |
Mozilla Firefox | =3.0.10 | |
Mozilla Firefox | =3.0.11 | |
Mozilla Firefox | =3.0.12 | |
Mozilla Firefox | =3.0.13 | |
Mozilla Firefox | =3.5 | |
Mozilla Firefox | =3.5.1 | |
Mozilla Firefox | =3.5.2 | |
Mozilla Firefox | =3.5.3 | |
Mozilla Firefox | =3.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2953 has a moderate severity rating, primarily affecting system performance rather than causing data exposure.
To mitigate CVE-2009-2953, upgrade to Mozilla Firefox version 3.5.5 or later.
CVE-2009-2953 allows remote attackers to cause a denial of service by consuming CPU resources.
CVE-2009-2953 affects Mozilla Firefox versions 3.0.6 through 3.0.13 and all 3.5.x versions.
CVE-2009-2953 is less relevant today as it affects outdated versions of Mozilla Firefox that are no longer supported.