{"vuid":"VU#879056","idnumber":"879056","name":"Mozilla browsers fail to properly handle images","keywords":["Mozilla","Firefox","SeaMonkey","information disclosure","DoS","denial of service","arbitrary code execution","designMode frames","Mozilla_20080207"],"overview":"A vulnerability exists in Mozilla products that may allow a remote attacker to view browser history or cause a denial of service.","clean_desc":"Mozilla products contain a vulnerability in the browser engine that may result in information disclosure or a denial of service when handling malicious image files when a user leaves a page with designMode frames. According to the Mozilla Foundation Security Advisory 2008-06: The reported issue can be used to steal a user's navigation history, forward navigation information, and crash the user's browser. The crash showed evidence of memory corruption and might be exploitable to run arbitrary code. Note that JavaScript must be enabled in order for this vulnerability to exist. JavaScript is enabled by default in the Firefox and Mozilla web browsers. Exploitation can occur by accessing a specially crafted web page with Firefox.","impact":"A remote, unauthorized attacker may be able to view browser history information or cause a denial of service.","resolution":"Apply an update\nAccording to the Mozilla Foundation Security Advisory 2008-06 this vulnerability is addressed in Firefox 2.0.0.12 and SeaMonkey 1.1.8","workarounds":"Disable JavaScript For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document. Use NoScript Using the Mozilla Firefox NoScript extension to whitelist web sites that can run scripts and access installed plugins will mitigate this vulnerability.","sysaffected":"","thanks":"This vulnerability is addressed in Mozilla Foundation Security Advisory \n2008-06\n. Mozilla credits David Bloom for reporting this issue.","author":"This document was written by Chris Taschner.","public":["http://www.mozilla.org/security/announce/2008/mfsa2008-06.html","https://bugzilla.mozilla.org/show_bug.cgi?id=400556"],"cveids":["CVE-2008-0419"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-02-08T14:35:29Z","publicdate":"2008-02-07T00:00:00Z","datefirstpublished":"2008-02-11T13:11:32Z","dateupdated":"2008-02-11T15:57:58Z","revision":21,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"10","cam_impact":"6","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"5.94","cam_scorecurrentwidelyknown":"7.29","cam_scorecurrentwidelyknownexploited":"12.69","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.94,"vulnote":null}