{"vuid":"VU#609956","idnumber":"609956","name":"Mozilla products vulnerable to memory corruption in the JavaScript engine","keywords":["Mozilla","memory corruption","arbitrary code execution","JavaScript engine","Mozilla_20070531"],"overview":"A vulnerability in the Mozilla JavaScript engine may allow execution of arbitrary code or denial of service.","clean_desc":"The Mozilla JavaScript engine contains an unspecified vulnerability that may result in memory corruption. The impact of this memory corruption is unclear. According to Mozilla Foundation Security Advisory  2007-12: Some of these crashes that showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Information about the individual bug reports addressed in this update can be found in Mozilla Foundation Security Advisory 2007-12.","impact":"Potential consequences include remote execution of arbitrary code and denial of service.","resolution":"Upgrade\nThese vulnerabilities are addressed in Firefox 2.0.0.4,  Firefox 1.5.0.12, Thunderbird 2.0.0.4, Thunderbird 1.5.0.12, SeaMonkey 1.0.9, SeaMonkey 1.1.2. Users that are unable to update should consider the following workaround:","workarounds":"Disable JavaScript For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document.","sysaffected":"","thanks":"These vulnerabilities were reported in Mozilla Foundation Security Advisory \n2007-12\n. Mozilla credits Brendan Eich, Igor Bukanov, Jesse Ruderman, moz_bug_r_a4 and Wladimir Palant with reporting these issues.","author":"This document was written by Chris Taschner.","public":["http://www.mozilla.org/security/announce/2007/mfsa2007-12.html","https://bugzilla.mozilla.org/show_bug.cgi?id=351102","https://bugzilla.mozilla.org/show_bug.cgi?id=369666","https://bugzilla.mozilla.org/show_bug.cgi?id=367561","https://bugzilla.mozilla.org/show_bug.cgi?id=370101","https://bugzilla.mozilla.org/show_bug.cgi?id=370488","https://bugzilla.mozilla.org/show_bug.cgi?id=375183","https://bugzilla.mozilla.org/show_bug.cgi?id=367630","https://bugzilla.mozilla.org/show_bug.cgi?id=375711","https://bugzilla.mozilla.org/show_bug.cgi?id=367121","https://bugzilla.mozilla.org/show_bug.cgi?id=369714","http://secunia.com/advisories/25489/"],"cveids":["CVE-2007-2868"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-05-31T12:24:18Z","publicdate":"2007-05-31T00:00:00Z","datefirstpublished":"2007-05-31T18:04:07Z","dateupdated":"2007-06-20T19:49:14Z","revision":37,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"19","cam_easeofexploitation":"11","cam_attackeraccessrequired":"19","cam_scorecurrent":"8.1901875","cam_scorecurrentwidelyknown":"17.1249375","cam_scorecurrentwidelyknownexploited":"32.0161875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.1901875,"vulnote":null}