VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-2766
firefox, seamonkey, thunderbird: The normalizeDocument function in Mozilla Firefox b...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2766

Original

The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-09-09
Source Information Category:
Advisory, Alert
Last Updated:
2010-09-09




Affected Product Tags
cpe:/a:mozilla:firefox:1.0
cpe:/a:mozilla:firefox:1.0.1
cpe:/a:mozilla:firefox:1.0.2
cpe:/a:mozilla:firefox:1.0.3
cpe:/a:mozilla:firefox:1.0.4
cpe:/a:mozilla:firefox:1.0.5
cpe:/a:mozilla:firefox:1.0.6
cpe:/a:mozilla:firefox:1.0.7
cpe:/a:mozilla:firefox:1.0.8
cpe:/a:mozilla:firefox:1.0:preview_release
cpe:/a:mozilla:firefox:1.5
cpe:/a:mozilla:firefox:1.5.0.1
cpe:/a:mozilla:firefox:1.5.0.10
cpe:/a:mozilla:firefox:1.5.0.11
cpe:/a:mozilla:firefox:1.5.0.12
cpe:/a:mozilla:firefox:1.5.0.2
cpe:/a:mozilla:firefox:1.5.0.3
cpe:/a:mozilla:firefox:1.5.0.4
cpe:/a:mozilla:firefox:1.5.0.5
cpe:/a:mozilla:firefox:1.5.0.6
cpe:/a:mozilla:firefox:1.5.0.7
cpe:/a:mozilla:firefox:1.5.0.8
cpe:/a:mozilla:firefox:1.5.0.9
cpe:/a:mozilla:firefox:1.5.1
cpe:/a:mozilla:firefox:1.5.2
cpe:/a:mozilla:firefox:1.5.3
cpe:/a:mozilla:firefox:1.5.4
cpe:/a:mozilla:firefox:1.5.5
cpe:/a:mozilla:firefox:1.5.6
cpe:/a:mozilla:firefox:1.5.7
cpe:/a:mozilla:firefox:1.5.8
cpe:/a:mozilla:firefox:1.5:beta1
cpe:/a:mozilla:firefox:1.5:beta2
cpe:/a:mozilla:firefox:2.0
cpe:/a:mozilla:firefox:2.0.0.1
cpe:/a:mozilla:firefox:2.0.0.10
cpe:/a:mozilla:firefox:2.0.0.11
cpe:/a:mozilla:firefox:2.0.0.12
cpe:/a:mozilla:firefox:2.0.0.13
cpe:/a:mozilla:firefox:2.0.0.14
cpe:/a:mozilla:firefox:2.0.0.15
cpe:/a:mozilla:firefox:2.0.0.16
cpe:/a:mozilla:firefox:2.0.0.17
cpe:/a:mozilla:firefox:2.0.0.18
cpe:/a:mozilla:firefox:2.0.0.19
cpe:/a:mozilla:firefox:2.0.0.2
cpe:/a:mozilla:firefox:2.0.0.20
cpe:/a:mozilla:firefox:2.0.0.3
cpe:/a:mozilla:firefox:2.0.0.4
cpe:/a:mozilla:firefox:2.0.0.5
cpe:/a:mozilla:firefox:2.0.0.6
cpe:/a:mozilla:firefox:2.0.0.7
cpe:/a:mozilla:firefox:2.0.0.8
cpe:/a:mozilla:firefox:2.0.0.9
cpe:/a:mozilla:firefox:3.0
cpe:/a:mozilla:firefox:3.0.1
cpe:/a:mozilla:firefox:3.0.10
cpe:/a:mozilla:firefox:3.0.11
cpe:/a:mozilla:firefox:3.0.12
cpe:/a:mozilla:firefox:3.0.13
cpe:/a:mozilla:firefox:3.0.14
cpe:/a:mozilla:firefox:3.0.15
cpe:/a:mozilla:firefox:3.0.16
cpe:/a:mozilla:firefox:3.0.17
cpe:/a:mozilla:firefox:3.0.2
cpe:/a:mozilla:firefox:3.0.3
cpe:/a:mozilla:firefox:3.0.4
cpe:/a:mozilla:firefox:3.0.5
cpe:/a:mozilla:firefox:3.0.6
cpe:/a:mozilla:firefox:3.0.7
cpe:/a:mozilla:firefox:3.0.8
cpe:/a:mozilla:firefox:3.0.9
cpe:/a:mozilla:firefox:3.5
cpe:/a:mozilla:firefox:3.5.1
cpe:/a:mozilla:firefox:3.5.10
cpe:/a:mozilla:firefox:3.5.11 and previous versions
cpe:/a:mozilla:firefox:3.5.2
cpe:/a:mozilla:firefox:3.5.3
cpe:/a:mozilla:firefox:3.5.4
cpe:/a:mozilla:firefox:3.5.5
cpe:/a:mozilla:firefox:3.5.6
cpe:/a:mozilla:firefox:3.5.7
cpe:/a:mozilla:firefox:3.5.8
cpe:/a:mozilla:firefox:3.5.9
cpe:/a:mozilla:firefox:3.6
cpe:/a:mozilla:firefox:3.6.2
cpe:/a:mozilla:firefox:3.6.3
cpe:/a:mozilla:firefox:3.6.4
cpe:/a:mozilla:firefox:3.6.6
cpe:/a:mozilla:firefox:3.6.7
cpe:/a:mozilla:firefox:3.6.8
cpe:/a:mozilla:seamonkey:1.0
cpe:/a:mozilla:seamonkey:1.0.1
cpe:/a:mozilla:seamonkey:1.0.2
cpe:/a:mozilla:seamonkey:1.0.3
cpe:/a:mozilla:seamonkey:1.0.4
cpe:/a:mozilla:seamonkey:1.0.5
cpe:/a:mozilla:seamonkey:1.0.6
cpe:/a:mozilla:seamonkey:1.0.7
cpe:/a:mozilla:seamonkey:1.0.8
cpe:/a:mozilla:seamonkey:1.0.9
cpe:/a:mozilla:seamonkey:1.0:alpha
cpe:/a:mozilla:seamonkey:1.0:beta
cpe:/a:mozilla:seamonkey:1.1
cpe:/a:mozilla:seamonkey:1.1.1
cpe:/a:mozilla:seamonkey:1.1.10
cpe:/a:mozilla:seamonkey:1.1.11
cpe:/a:mozilla:seamonkey:1.1.12
cpe:/a:mozilla:seamonkey:1.1.13
cpe:/a:mozilla:seamonkey:1.1.14
cpe:/a:mozilla:seamonkey:1.1.15
cpe:/a:mozilla:seamonkey:1.1.16
cpe:/a:mozilla:seamonkey:1.1.17
cpe:/a:mozilla:seamonkey:1.1.18
cpe:/a:mozilla:seamonkey:1.1.19
cpe:/a:mozilla:seamonkey:1.1.2
cpe:/a:mozilla:seamonkey:1.1.3
cpe:/a:mozilla:seamonkey:1.1.4
cpe:/a:mozilla:seamonkey:1.1.5
cpe:/a:mozilla:seamonkey:1.1.6
cpe:/a:mozilla:seamonkey:1.1.7
cpe:/a:mozilla:seamonkey:1.1.8
cpe:/a:mozilla:seamonkey:1.1.9
cpe:/a:mozilla:seamonkey:1.1:alpha
cpe:/a:mozilla:seamonkey:1.1:beta
cpe:/a:mozilla:seamonkey:1.5.0.10
cpe:/a:mozilla:seamonkey:1.5.0.8
cpe:/a:mozilla:seamonkey:1.5.0.9
cpe:/a:mozilla:seamonkey:2.0
cpe:/a:mozilla:seamonkey:2.0.1
cpe:/a:mozilla:seamonkey:2.0.2
cpe:/a:mozilla:seamonkey:2.0.3
cpe:/a:mozilla:seamonkey:2.0.4
cpe:/a:mozilla:seamonkey:2.0.5
cpe:/a:mozilla:seamonkey:2.0.6 and previous versions
cpe:/a:mozilla:seamonkey:2.0:alpha_1
cpe:/a:mozilla:seamonkey:2.0:alpha_2
cpe:/a:mozilla:seamonkey:2.0:alpha_3
cpe:/a:mozilla:seamonkey:2.0:beta_1
cpe:/a:mozilla:seamonkey:2.0:beta_2
cpe:/a:mozilla:seamonkey:2.0:rc1
cpe:/a:mozilla:seamonkey:2.0:rc2
cpe:/a:mozilla:seamonkey:2.0a1pre
cpe:/a:mozilla:thunderbird:0.1
cpe:/a:mozilla:thunderbird:0.2
cpe:/a:mozilla:thunderbird:0.3
cpe:/a:mozilla:thunderbird:0.4
cpe:/a:mozilla:thunderbird:0.5
cpe:/a:mozilla:thunderbird:0.6
cpe:/a:mozilla:thunderbird:0.7
cpe:/a:mozilla:thunderbird:0.7.1
cpe:/a:mozilla:thunderbird:0.7.2
cpe:/a:mozilla:thunderbird:0.7.3
cpe:/a:mozilla:thunderbird:0.8
cpe:/a:mozilla:thunderbird:0.9
cpe:/a:mozilla:thunderbird:1.0
cpe:/a:mozilla:thunderbird:1.0.1
cpe:/a:mozilla:thunderbird:1.0.2
cpe:/a:mozilla:thunderbird:1.0.3
cpe:/a:mozilla:thunderbird:1.0.4
cpe:/a:mozilla:thunderbird:1.0.5
cpe:/a:mozilla:thunderbird:1.0.6
cpe:/a:mozilla:thunderbird:1.0.7
cpe:/a:mozilla:thunderbird:1.0.8
cpe:/a:mozilla:thunderbird:1.5
cpe:/a:mozilla:thunderbird:1.5.0.1
cpe:/a:mozilla:thunderbird:1.5.0.10
cpe:/a:mozilla:thunderbird:1.5.0.11
cpe:/a:mozilla:thunderbird:1.5.0.12
cpe:/a:mozilla:thunderbird:1.5.0.13
cpe:/a:mozilla:thunderbird:1.5.0.14
cpe:/a:mozilla:thunderbird:1.5.0.2
cpe:/a:mozilla:thunderbird:1.5.0.3
cpe:/a:mozilla:thunderbird:1.5.0.4
cpe:/a:mozilla:thunderbird:1.5.0.5
cpe:/a:mozilla:thunderbird:1.5.0.6
cpe:/a:mozilla:thunderbird:1.5.0.7
cpe:/a:mozilla:thunderbird:1.5.0.8
cpe:/a:mozilla:thunderbird:1.5.0.9
cpe:/a:mozilla:thunderbird:1.5.1
cpe:/a:mozilla:thunderbird:1.5.2
cpe:/a:mozilla:thunderbird:1.5:beta2
cpe:/a:mozilla:thunderbird:2.0
cpe:/a:mozilla:thunderbird:2.0.0.0
cpe:/a:mozilla:thunderbird:2.0.0.1
cpe:/a:mozilla:thunderbird:2.0.0.12
cpe:/a:mozilla:thunderbird:2.0.0.14
cpe:/a:mozilla:thunderbird:2.0.0.16
cpe:/a:mozilla:thunderbird:2.0.0.17
cpe:/a:mozilla:thunderbird:2.0.0.18
cpe:/a:mozilla:thunderbird:2.0.0.19
cpe:/a:mozilla:thunderbird:2.0.0.2
cpe:/a:mozilla:thunderbird:2.0.0.21
cpe:/a:mozilla:thunderbird:2.0.0.22
cpe:/a:mozilla:thunderbird:2.0.0.23
cpe:/a:mozilla:thunderbird:2.0.0.3
cpe:/a:mozilla:thunderbird:2.0.0.4
cpe:/a:mozilla:thunderbird:2.0.0.5
cpe:/a:mozilla:thunderbird:2.0.0.6
cpe:/a:mozilla:thunderbird:2.0.0.7
cpe:/a:mozilla:thunderbird:2.0.0.8
cpe:/a:mozilla:thunderbird:2.0.0.9
cpe:/a:mozilla:thunderbird:3.0
cpe:/a:mozilla:thunderbird:3.0.1
cpe:/a:mozilla:thunderbird:3.0.2
cpe:/a:mozilla:thunderbird:3.0.3
cpe:/a:mozilla:thunderbird:3.0.4
cpe:/a:mozilla:thunderbird:3.0.5
cpe:/a:mozilla:thunderbird:3.0.6 and previous versions
cpe:/a:mozilla:thunderbird:3.1
cpe:/a:mozilla:thunderbird:3.1.1
cpe:/a:mozilla:thunderbird:3.1.2
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

Alternatives




References
CONFIRM https://bugzilla.mozilla.org/show_bug.cgi?id=580445




CONFIRM http://www.mozilla.org/security/announce/2010/mfsa2010-57.html




Vulnerability Type Code Injection (CWE-94)





Copyright © 2010 JPCERT/CC All Rights Reserved.