ID

VAR-201112-0034


CVE

CVE-2011-3664


TITLE

Mac OS X Multiple running on Mozilla Service disruption in products (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-003501

DESCRIPTION

Mozilla Firefox before 9.0, Thunderbird before 9.0, and SeaMonkey before 2.6 on Mac OS X do not properly handle certain DOM frame deletions by plugins, which allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) or possibly have unspecified other impact via a crafted web site. Mozilla Firefox is prone to a denial-of-service vulnerability because of a NULL-pointer dereference. Successful exploits may allow remote attackers to cause denial-of-service conditions. Given the nature of this issue attackers may also be able to run arbitrary code, but this has not been confirmed. This issue is fixed in: Firefox 9.0 Thunderbird 9.0 SeaMonkey 2.6. Firefox is a very popular open source web browser. Thunderbird is an email client that supports IMAP, POP email protocols, and HTML email formats. SeaMonkey is an open source web browser, mail and newsgroup client, IRC session client, and HTML editor. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Mozilla Firefox / Thunderbird Multiple Vulnerabilities SECUNIA ADVISORY ID: SA47302 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47302/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47302 RELEASE DATE: 2011-12-21 DISCUSS ADVISORY: http://secunia.com/advisories/47302/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47302/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47302 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further information is currently available. 2) An error exists within the YARR regular expression library when parsing javascript content. 3) An error within the SVG implementation when SVG elements are removed during a DOMAttrModified event can be exploited to cause an out-of-bounds memory access. 4) The application does not properly handle SVG animation accessKey events when JavaScript is disabled. This can lead to the user's key strokes being leaked. 5) An error within the plugin handler when deleting DOM frame can be exploited to dereference memory. NOTE: This vulnerability only affects Mac OS X. 6) An error exists within the handling of OGG <video> elements. Successful exploitation of vulnerabilities #1 - #3 and #5 may allow execution of arbitrary code. SOLUTION: Upgrade to version 9.0. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Alexandre Poirot, Chris Blizzard, Kyle Huey, Scoobidiver, Christian Holler, David Baron, Gary Kwong, Jim Blandy, Bob Clary, Jesse Ruderman, Marcia Knous, and Rober Longson 2) Aki Helin 3) regenrecht via ZDI 4) Mario Heiderich 5) Richard Bateman 6) sczimmer ORIGINAL ADVISORY: Mozilla: http://www.mozilla.org/security/announce/2011/mfsa2011-53.html http://www.mozilla.org/security/announce/2011/mfsa2011-54.html http://www.mozilla.org/security/announce/2011/mfsa2011-55.html http://www.mozilla.org/security/announce/2011/mfsa2011-56.html http://www.mozilla.org/security/announce/2011/mfsa2011-57.html http://www.mozilla.org/security/announce/2011/mfsa2011-58.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2011-3664 // JVNDB: JVNDB-2011-003501 // BID: 51137 // VULHUB: VHN-51609 // PACKETSTORM: 108085 // PACKETSTORM: 108084

AFFECTED PRODUCTS

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.5

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.4

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.1

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.3

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:1.0

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.2

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:1.1

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.2

Trust: 1.6

vendor:mozillamodel:thunderbirdscope:eqversion:6.0

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.14

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.12

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.11

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.17

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.10

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.8

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.18

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:5.0.1

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.6

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:4.0.1

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.2

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.6

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.4

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.23

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.1

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:4.0

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.7

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.7

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.2

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.13

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.11

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.10

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.3

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.4

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.1

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.6

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.7

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.12

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.11

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.5

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.14

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.6

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:5.0

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.9

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.9

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:6.0

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.5

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.2

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.12

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.7

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.8

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.9

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.2

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.20

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.5

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0.1

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.14

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.1

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.9

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.10

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.2

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.8

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.3

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.15

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.10

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.4

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.3

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.1

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.4

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.8

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.16

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.6

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.10

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.13

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.14

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.15

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.13

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.15

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.13

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.3

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.11

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.11

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.9

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.24

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.1

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.1

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.2

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.12

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.21

Trust: 1.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.8

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:7.0

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.22

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.16

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:7.0.1

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.3

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:5.0

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.19

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.4

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.1

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.5

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.7

Trust: 1.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.2

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:0.10.1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:lteversion:8.0

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.9

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.15

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.13

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.4.1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.3

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.14

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.4

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.14

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.6

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.18

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.4

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.5

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.19

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.7

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.12

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.5

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.6.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.2

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.0

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.0

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.11

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.4

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.7.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.3

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.10

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.19

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.5

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.8

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.17

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.11

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.7

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.17

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.23

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.12

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.9

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.12

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.9

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.8

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.9

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.13

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.9

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0.5

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.22

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.4

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.10

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.10

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.7

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.16

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.20

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.6

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.12

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.2

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.6

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.13

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.6

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.6

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.4

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.6

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.9.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.17

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.10

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.18

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.6

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0.7

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.8

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.14

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:lteversion:2.5

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.7.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.4

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.10

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.4

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.16

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.5

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.7

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.15

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.9

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.3

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.4

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.12

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.5

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.5

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.19

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0.4

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.7

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.7

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.16

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0a1pre

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.11

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.14

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.3

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.6

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.7

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.11

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.5

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.11

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.99

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.8

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.21

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.17

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.9

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.2

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.4

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.12

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:3.0.15

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.9.1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0a1

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.15

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.7

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.9

Trust: 1.0

vendor:mozillamodel:firefoxscope:lteversion:8.0

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.13

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.7

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:0.9.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.4

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.16

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.14

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.20

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.7

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.9

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.5.0.10

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.6

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.6

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.3

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:0.5

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0.6

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.6

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.3.3

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.18

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.5

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.7.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.10

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.5.0.8

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.13

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.5.0.9

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.11

Trust: 1.0

vendor:mozillamodel:firefoxscope:ltversion:9.0

Trust: 0.8

vendor:mozillamodel:seamonkeyscope:ltversion:2.6

Trust: 0.8

vendor:mozillamodel:thunderbirdscope:ltversion:9.0

Trust: 0.8

vendor:mozillamodel:seamonkeyscope:eqversion:2.5

Trust: 0.6

vendor:mozillamodel:firefox beta4scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox beta9scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox beta5scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:9.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7

Trust: 0.3

vendor:mozillamodel:firefox beta10scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.2

Trust: 0.3

vendor:mozillamodel:seamonkey rc1scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox beta6scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:seamonkey 2.1b2scope: - version: -

Trust: 0.3

vendor:mozillamodel:firefox beta3scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox beta7scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:2.01

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:2.6

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.02

Trust: 0.3

vendor:mozillamodel:firefox beta11scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.3

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.62

Trust: 0.3

vendor:mozillamodel:firefox beta12scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox beta8scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:9.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.16

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.01

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.25

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:8.0

Trust: 0.3

vendor:mozillamodel:seamonkey alpha1scope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.17

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.03

Trust: 0.3

vendor:mozillamodel:seamonkey rc2scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.17

Trust: 0.3

vendor:mozillamodel:firefox beta1scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.63

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:2.02

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.19

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.3

Trust: 0.3

vendor:mozillamodel:seamonkey alpha3scope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:seamonkey alpha2scope:eqversion:2.1

Trust: 0.3

sources: BID: 51137 // JVNDB: JVNDB-2011-003501 // CNNVD: CNNVD-201112-388 // NVD: CVE-2011-3664

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3664
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-3664
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201112-388
value: MEDIUM

Trust: 0.6

VULHUB: VHN-51609
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-3664
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-51609
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-51609 // JVNDB: JVNDB-2011-003501 // CNNVD: CNNVD-201112-388 // NVD: CVE-2011-3664

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2011-003501 // NVD: CVE-2011-3664

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201112-388

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201112-388

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003501

PATCH

title:Seamonkeyurl:http://www.seamonkey-project.org

Trust: 0.8

title:MFSA2011-57url:http://www.mozilla.org/security/announce/2011/mfsa2011-57.html

Trust: 0.8

title:MFSA2011-57url:http://www.mozilla-japan.org/security/announce/2011/mfsa2011-57.html

Trust: 0.8

title:Thunderbird Setup 9.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42225

Trust: 0.6

title:Thunderbird 9.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42224

Trust: 0.6

title:thunderbird-9.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42228

Trust: 0.6

title:thunderbird-9.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42227

Trust: 0.6

title:thunderbird-9.0.sourceurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42226

Trust: 0.6

title:SeaMonkey Setup 2.6url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42221

Trust: 0.6

title:SeaMonkey 2.6.testsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42220

Trust: 0.6

title:SeaMonkey 2.6url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42219

Trust: 0.6

title:seamonkey-2.6url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42223

Trust: 0.6

title:seamonkey-2.6.sourceurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42222

Trust: 0.6

title:Firefox 9.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42213

Trust: 0.6

title:firefox-9.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42217

Trust: 0.6

title:firefox-9.0.sourceurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42216

Trust: 0.6

title:firefox-9.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42215

Trust: 0.6

title:Firefox Setup 9.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42214

Trust: 0.6

title:firefox-9.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42218

Trust: 0.6

sources: JVNDB: JVNDB-2011-003501 // CNNVD: CNNVD-201112-388

EXTERNAL IDS

db:NVDid:CVE-2011-3664

Trust: 2.8

db:SECUNIAid:47302

Trust: 1.8

db:SECUNIAid:47334

Trust: 1.8

db:SECTRACKid:1026445

Trust: 1.1

db:SECTRACKid:1026447

Trust: 1.1

db:SECTRACKid:1026446

Trust: 1.1

db:BIDid:51137

Trust: 1.0

db:JVNDBid:JVNDB-2011-003501

Trust: 0.8

db:CNNVDid:CNNVD-201112-388

Trust: 0.7

db:NSFOCUSid:18368

Trust: 0.6

db:VULHUBid:VHN-51609

Trust: 0.1

db:PACKETSTORMid:108085

Trust: 0.1

db:PACKETSTORMid:108084

Trust: 0.1

sources: VULHUB: VHN-51609 // BID: 51137 // JVNDB: JVNDB-2011-003501 // PACKETSTORM: 108085 // PACKETSTORM: 108084 // CNNVD: CNNVD-201112-388 // NVD: CVE-2011-3664

REFERENCES

url:http://www.mozilla.org/security/announce/2011/mfsa2011-57.html

Trust: 2.2

url:https://bugzilla.mozilla.org/show_bug.cgi?id=649079

Trust: 1.7

url:http://secunia.com/advisories/47302

Trust: 1.7

url:http://secunia.com/advisories/47334

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14574

Trust: 1.1

url:http://www.securitytracker.com/id?1026445

Trust: 1.1

url:http://www.securitytracker.com/id?1026446

Trust: 1.1

url:http://www.securitytracker.com/id?1026447

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3664

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3664

Trust: 0.8

url:http://www.securityfocus.com/bid/51137

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18368

Trust: 0.6

url:http://software.cisco.com/download/navigator.html?mdfid=281787278

Trust: 0.3

url:http://www.mozilla.org/projects/seamonkey/

Trust: 0.3

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-0676

Trust: 0.3

url:http://www.mozilla.org/security/announce/2011/mfsa2011-55.html

Trust: 0.2

url:http://www.mozilla.org/security/announce/2011/mfsa2011-54.html

Trust: 0.2

url:http://www.mozilla.org/security/announce/2011/mfsa2011-56.html

Trust: 0.2

url:http://secunia.com/company/jobs/

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://www.mozilla.org/security/announce/2011/mfsa2011-53.html

Trust: 0.2

url:http://www.mozilla.org/security/announce/2011/mfsa2011-58.html

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47334

Trust: 0.1

url:http://secunia.com/advisories/47334/

Trust: 0.1

url:http://secunia.com/advisories/47334/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47302

Trust: 0.1

url:http://secunia.com/advisories/47302/#comments

Trust: 0.1

url:http://secunia.com/advisories/47302/

Trust: 0.1

sources: VULHUB: VHN-51609 // BID: 51137 // JVNDB: JVNDB-2011-003501 // PACKETSTORM: 108085 // PACKETSTORM: 108084 // CNNVD: CNNVD-201112-388 // NVD: CVE-2011-3664

CREDITS

Richard Bateman

Trust: 0.9

sources: BID: 51137 // CNNVD: CNNVD-201112-388

SOURCES

db:VULHUBid:VHN-51609
db:BIDid:51137
db:JVNDBid:JVNDB-2011-003501
db:PACKETSTORMid:108085
db:PACKETSTORMid:108084
db:CNNVDid:CNNVD-201112-388
db:NVDid:CVE-2011-3664

LAST UPDATE DATE

2024-11-23T19:43:20.560000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-51609date:2017-09-19T00:00:00
db:BIDid:51137date:2015-04-13T21:26:00
db:JVNDBid:JVNDB-2011-003501date:2011-12-22T00:00:00
db:CNNVDid:CNNVD-201112-388date:2011-12-22T00:00:00
db:NVDid:CVE-2011-3664date:2024-11-21T01:30:57.560

SOURCES RELEASE DATE

db:VULHUBid:VHN-51609date:2011-12-21T00:00:00
db:BIDid:51137date:2011-12-20T00:00:00
db:JVNDBid:JVNDB-2011-003501date:2011-12-22T00:00:00
db:PACKETSTORMid:108085date:2011-12-21T04:34:43
db:PACKETSTORMid:108084date:2011-12-21T04:34:40
db:CNNVDid:CNNVD-201112-388date:1900-01-01T00:00:00
db:NVDid:CVE-2011-3664date:2011-12-21T04:02:01.100