First published: Thu Oct 29 2009(Updated: )
The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =3.5.3 | |
Firefox | =3.0.7 | |
Firefox | =3.0.9 | |
Firefox | =3.0.8 | |
Firefox | =3.0.4 | |
Firefox | =3.0.5 | |
Firefox | =3.5.1 | |
Firefox | =3.5.2 | |
Firefox | =3.0.10 | |
Firefox | =3.0.12 | |
Firefox | =3.0.3 | |
Firefox | =3.0.6 | |
Firefox | =3.0.1 | |
Firefox | =3.0.2 | |
Firefox | =3.0-beta5 | |
Firefox | =3.0.13 | |
Firefox | =3.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3374 has a severity rating of high due to its potential for remote code execution.
To fix CVE-2009-3374, users should update to Mozilla Firefox version 3.0.15 or 3.5.4 or later.
CVE-2009-3374 affects Mozilla Firefox versions 3.0.x prior to 3.0.15 and 3.5.x prior to 3.5.4.
CVE-2009-3374 is a security vulnerability that allows remote attackers to execute arbitrary code.
There are no known effective workarounds for CVE-2009-3374, so updating is strongly recommended.