ID CVE-2009-0071
Summary Mozilla Firefox 3.0.5 and earlier 3.0.x versions, when designMode is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a certain (a) replaceChild or (b) removeChild call, followed by a (1) queryCommandValue, (2) queryCommandState, or (3) queryCommandIndeterm call. NOTE: it was later reported that 3.0.6 and 3.0.7 are also affected.
References
Vulnerable Configurations
  • Mozilla Firefox 3.0.5
    cpe:2.3:a:mozilla:firefox:3.0.5
  • Mozilla Firefox 3.0.4
    cpe:2.3:a:mozilla:firefox:3.0.4
  • Mozilla Firefox 3.0.3
    cpe:2.3:a:mozilla:firefox:3.0.3
  • Mozilla Firefox 3.0.2
    cpe:2.3:a:mozilla:firefox:3.0.2
  • Mozilla Firefox 3.0.1
    cpe:2.3:a:mozilla:firefox:3.0.1
  • Mozilla Firefox 3.0
    cpe:2.3:a:mozilla:firefox:3.0
  • cpe:2.3:a:mozilla:firefox:3.0:alpha
    cpe:2.3:a:mozilla:firefox:3.0:alpha
  • Mozilla Firefox 3.0 Beta 2
    cpe:2.3:a:mozilla:firefox:3.0:beta2
  • cpe:2.3:a:mozilla:firefox:3.0:beta5
    cpe:2.3:a:mozilla:firefox:3.0:beta5
CVSS
Base: 2.6 (as of 09-01-2009 - 10:12)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
  • description Mozilla Firefox 3.0.6 (BODY onload) Remote Crash Exploit. CVE-2009-0071. Dos exploits for multiple platform
    file exploits/multiple/dos/8091.html
    id EDB-ID:8091
    last seen 2016-02-01
    modified 2009-02-23
    platform multiple
    port
    published 2009-02-23
    reporter Skylined
    source https://www.exploit-db.com/download/8091/
    title Mozilla Firefox 3.0.6 BODY onload Remote Crash Exploit
    type dos
  • id EDB-ID:8219
nessus via4
NASL family Gentoo Local Security Checks
NASL id GENTOO_GLSA-201301-01.NASL
description The remote host is affected by the vulnerability described in GLSA-201301-01 (Mozilla Products: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL’s for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser’s font, conduct clickjacking attacks, or have other unspecified impact. A local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. Workaround : There is no known workaround at this time.
last seen 2019-02-21
modified 2018-11-19
plugin id 63402
published 2013-01-08
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=63402
title GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)
refmap via4
bid 33154
confirm
exploit-db
  • 8091
  • 8219
fulldisc
  • 20090107 Firefox 3.0.5 remote vulnerability via queryCommandState
  • 20090107 Re: Firefox 3.0.5 remote vulnerability via queryCommandState
statements via4
contributor Joshua Bressers
lastmodified 2009-01-19
organization Red Hat
statement Red Hat does not consider a crash of a client application such as Firefox to be a security issue.
Last major update 25-03-2009 - 00:00
Published 08-01-2009 - 14:30
Last modified 28-09-2017 - 21:33
Back to Top