{ "id": "CVE-2010-0159", "sourceIdentifier": "cve@mitre.org", "published": "2010-02-22T13:00:02.000", "lastModified": "2018-11-16T15:56:41.103", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors." }, { "lang": "es", "value": "El motor de navegaci\u00f3n en Mozilla Firefox v3.0.x anterior a la v3.0.18 y 3.5.x anterior a la v3.5.8, Thunderbird anterior a la v3.0.2, y SeaMonkey anterior a la v2.0.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda de la aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores relativos a la funci\u00f3n nsBlockFrame::StealFrame en layout/generic/nsBlockFrame.cpp, ay otros vectores no espec\u00edficos." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 10.0 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": true, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.0.18", "matchCriteriaId": "84F2F792-6802-4DB0-A635-EAB4C2239050" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.5", "versionEndExcluding": "3.5.8", "matchCriteriaId": "D8CCC7A5-1BEB-4863-B57D-9472B6BA0978" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.0.3", "matchCriteriaId": "6ABA76B1-44D0-41CF-A939-340DEB8FA617" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.0.2", "matchCriteriaId": "B01BAE80-9920-4E1E-AB57-DF17D4E33502" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0" } ] } ] } ], "references": [ { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035346.html", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035367.html", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035426.html", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036097.html", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036132.html", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00001.html", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/37242", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/38770", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/38772", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/38847", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.debian.org/security/2010/dsa-1999", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:042", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.mozilla.org/security/announce/2010/mfsa2010-01.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0112.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0113.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0153.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0154.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.ubuntu.com/usn/USN-895-1", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.ubuntu.com/usn/USN-896-1", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/0405", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/0650", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=467005", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=501934", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=527567", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=528134", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=528300", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=530880", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=534082", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56359", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8485", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9590", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] } ] }