Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2009-0772
Description:The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
Test IDs: 1.3.6.1.4.1.25623.1.0.63528   1.3.6.1.4.1.25623.1.0.63655   1.3.6.1.4.1.25623.1.0.63724   1.3.6.1.4.1.25623.1.0.63529   1.3.6.1.4.1.25623.1.0.63848   1.3.6.1.4.1.25623.1.0.63723   1.3.6.1.4.1.25623.1.0.63657   1.3.6.1.4.1.25623.1.0.63610  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2009-0772
BugTraq ID: 33990
http://www.securityfocus.com/bid/33990
Debian Security Information: DSA-1751 (Google Search)
http://www.debian.org/security/2009/dsa-1751
Debian Security Information: DSA-1830 (Google Search)
http://www.debian.org/security/2009/dsa-1830
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:075
http://www.mandriva.com/security/advisories?name=MDVSA-2009:083
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5703
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5945
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6097
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6811
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9609
RedHat Security Advisories: RHSA-2009:0258
http://www.redhat.com/support/errata/RHSA-2009-0258.html
RedHat Security Advisories: RHSA-2009:0315
http://www.redhat.com/support/errata/RHSA-2009-0315.html
RedHat Security Advisories: RHSA-2009:0325
http://www.redhat.com/support/errata/RHSA-2009-0325.html
http://www.securitytracker.com/id?1021795
http://secunia.com/advisories/34137
http://secunia.com/advisories/34140
http://secunia.com/advisories/34145
http://secunia.com/advisories/34272
http://secunia.com/advisories/34324
http://secunia.com/advisories/34383
http://secunia.com/advisories/34387
http://secunia.com/advisories/34417
http://secunia.com/advisories/34462
http://secunia.com/advisories/34464
http://secunia.com/advisories/34527
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952
SuSE Security Announcement: SUSE-SA:2009:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html
SuSE Security Announcement: SUSE-SA:2009:023 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html
https://usn.ubuntu.com/741-1/
http://www.vupen.com/english/advisories/2009/0632




© 1998-2024 E-Soft Inc. All rights reserved.