Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-0776

Опубликовано: 26 фев. 2007
Источник: debian
EPSS Средний

Описание

Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
iceweaselfixed2.0.0.2+dfsg-1package
iceapefixed1.0.8-1package
icedovefixed1.5.0.10.dfsg1-1package
xulrunnerfixed1.8.0.10-1package
mozilla-firefoxnot-affectedsargepackage
mozilla-thunderbirdnot-affectedsargepackage
mozillanot-affectedsargepackage

Примечания

  • MFSA-2007-01

EPSS

Процентиль: 96%
0.30178
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.

nvd
больше 18 лет назад

Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.

github
больше 3 лет назад

Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.

EPSS

Процентиль: 96%
0.30178
Средний