9.3

CVE-2008-5021

nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.

Data is provided by the National Vulnerability Database (NVD)
MozillaFirefox Version >= 2.0 < 2.0.0.18
MozillaFirefox Version >= 3.0 < 3.0.4
MozillaSeamonkey Version >= 1.0 < 1.1.13
MozillaThunderbird Version >= 2.0 < 2.0.0.18
DebianDebian Linux Version4.0
CanonicalUbuntu Linux Version6.06 SwEditionlts
CanonicalUbuntu Linux Version7.10
CanonicalUbuntu Linux Version8.04 SwEditionlts
CanonicalUbuntu Linux Version8.10
FedoraprojectFedora Version8
FedoraprojectFedora Version9
SuseLinux Enterprise Debuginfo Version10 Updatesp2
NovellLinux Desktop Version9
OpensuseOpensuse Version10.2
OpensuseOpensuse Version10.3
OpensuseOpensuse Version11.0
SuseLinux Enterprise Desktop Version10 Update-
SuseLinux Enterprise Server Version10 Updatesp1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 25.26% 0.96
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

http://secunia.com/advisories/33433
Third Party Advisory
Broken Link
http://www.debian.org/security/2009/dsa-1697
Third Party Advisory
Mailing List
http://secunia.com/advisories/33434
Third Party Advisory
Broken Link
http://www.debian.org/security/2009/dsa-1696
Third Party Advisory
Mailing List
http://secunia.com/advisories/34501
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2009/0977
Third Party Advisory
Broken Link
http://secunia.com/advisories/32845
Third Party Advisory
Broken Link
http://www.debian.org/security/2008/dsa-1669
Third Party Advisory
Mailing List
http://secunia.com/advisories/32684
Third Party Advisory
Broken Link
http://secunia.com/advisories/32693
Third Party Advisory
Broken Link
http://secunia.com/advisories/32714
Third Party Advisory
Broken Link
http://secunia.com/advisories/32721
Third Party Advisory
Broken Link
http://secunia.com/advisories/32778
Third Party Advisory
Broken Link
http://secunia.com/advisories/32853
Third Party Advisory
Broken Link
http://ubuntu.com/usn/usn-667-1
Third Party Advisory
http://www.debian.org/security/2008/dsa-1671
Third Party Advisory
Mailing List
http://www.us-cert.gov/cas/techalerts/TA08-319A.html
Third Party Advisory
US Government Resource
http://secunia.com/advisories/32694
Third Party Advisory
Broken Link
http://secunia.com/advisories/32695
Third Party Advisory
Broken Link
http://secunia.com/advisories/32713
Third Party Advisory
Broken Link
http://www.securityfocus.com/bid/32281
Third Party Advisory
Broken Link
VDB Entry
http://www.vupen.com/english/advisories/2008/3146
Third Party Advisory
Broken Link
http://secunia.com/advisories/32715
Third Party Advisory
Broken Link
http://secunia.com/advisories/32798
Third Party Advisory
Broken Link
http://www.securitytracker.com/id?1021186
Third Party Advisory
Broken Link
VDB Entry