Race condition in the NPObjWrapper_NewResolve function in modules/plugin/base/src/nsJSNPRuntime.cpp in xul.dll in Mozilla Firefox 3 before 3.0.11 might allow remote attackers to execute arbitrary code via a page transition during Java applet loading, related to a use-after-free vulnerability for memory associated with a destroyed Java object.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/34241 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/35331 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/35415 - Broken Link | |
References | () http://secunia.com/advisories/35431 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/35468 - Broken Link | |
References | () http://secunia.com/secunia_research/2009-19/ - Broken Link, Vendor Advisory | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 - Broken Link | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 - Broken Link | |
References | () http://www.debian.org/security/2009/dsa-1820 - Mailing List, Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2009/mfsa2009-28.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/504260/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/35326 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/35360 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1022386 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2009/1572 - Broken Link, Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=486269 - Exploit, Issue Tracking | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=503579 - Issue Tracking | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 - Broken Link | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1095.html - Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html - Mailing List | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html - Mailing List |
02 Feb 2024, 16:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 7.5 |
First Time |
Redhat
Redhat enterprise Linux Debian debian Linux Redhat enterprise Linux Eus Debian Redhat enterprise Linux Server Aus Redhat enterprise Linux Server Redhat enterprise Linux Desktop Fedoraproject Redhat enterprise Linux Workstation Fedoraproject fedora |
|
CWE | CWE-416 | |
CPE | cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:* |
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:* |
References | (DEBIAN) http://www.debian.org/security/2009/dsa-1820 - Mailing List, Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2009/1572 - Broken Link, Vendor Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/504260/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/35326 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/35331 - Broken Link, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/34241 - Broken Link, Vendor Advisory | |
References | (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=486269 - Exploit, Issue Tracking | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=503579 - Issue Tracking | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html - Mailing List | |
References | (SECUNIA) http://secunia.com/advisories/35431 - Broken Link, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/35360 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/35415 - Broken Link | |
References | (MISC) http://secunia.com/secunia_research/2009-19/ - Broken Link, Vendor Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id?1022386 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/35468 - Broken Link | |
References | (REDHAT) https://rhn.redhat.com/errata/RHSA-2009-1095.html - Third Party Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 - Broken Link | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html - Mailing List | |
References | (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 - Broken Link |
Information
Published : 2009-06-12 21:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-1837
Mitre link : CVE-2009-1837
CVE.ORG link : CVE-2009-1837
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
redhat
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux
- enterprise_linux_eus
mozilla
- firefox