Vulnerability Details : CVE-2008-1233
Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2008-1233
Probability of exploitation activity in the next 30 days: 41.60%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-1233
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2008-1233
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1233
- http://www.vupen.com/english/advisories/2008/0998/references
- http://www.redhat.com/support/errata/RHSA-2008-0209.html
- http://rhn.redhat.com/errata/RHSA-2008-0208.html
- http://www.securityfocus.com/archive/1/490196/100/0/threaded
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:080
- http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
- http://www.debian.org/security/2008/dsa-1534
- http://www.debian.org/security/2008/dsa-1535
- http://www.securitytracker.com/id?1019694
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
- http://www.mozilla.org/security/announce/2008/mfsa2008-14.html
- http://www.debian.org/security/2008/dsa-1574
- http://www.securityfocus.com/bid/28448
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
- http://www.vupen.com/english/advisories/2008/0999/references
-
http://www.kb.cert.org/vuls/id/466521
US Government Resource
- http://www.vupen.com/english/advisories/2008/2091/references
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41443
-
http://www.us-cert.gov/cas/techalerts/TA08-087A.html
US Government Resource
- http://www.debian.org/security/2008/dsa-1532
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
- http://www.redhat.com/support/errata/RHSA-2008-0207.html
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
- http://www.vupen.com/english/advisories/2008/1793/references
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
- http://www.ubuntu.com/usn/usn-592-1
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
- http://www.ubuntu.com/usn/usn-605-1
Products affected by CVE-2008-1233
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*