The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Mozilla Subscribe
Firefox Subscribe
Seamonkey Subscribe
Thunderbird Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-428-1 Firefox vulnerabilities
Ubuntu USN Ubuntu USN USN-431-1 Thunderbird vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc cve-icon cve-icon
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc cve-icon cve-icon
http://fedoranews.org/cms/node/2713 cve-icon cve-icon
http://fedoranews.org/cms/node/2728 cve-icon cve-icon
http://fedoranews.org/cms/node/2747 cve-icon cve-icon
http://fedoranews.org/cms/node/2749 cve-icon cve-icon
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 cve-icon cve-icon
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2007-0077.html cve-icon cve-icon
http://secunia.com/advisories/24205 cve-icon cve-icon
http://secunia.com/advisories/24238 cve-icon cve-icon
http://secunia.com/advisories/24252 cve-icon cve-icon
http://secunia.com/advisories/24287 cve-icon cve-icon
http://secunia.com/advisories/24290 cve-icon cve-icon
http://secunia.com/advisories/24293 cve-icon cve-icon
http://secunia.com/advisories/24320 cve-icon cve-icon
http://secunia.com/advisories/24328 cve-icon cve-icon
http://secunia.com/advisories/24333 cve-icon cve-icon
http://secunia.com/advisories/24342 cve-icon cve-icon
http://secunia.com/advisories/24343 cve-icon cve-icon
http://secunia.com/advisories/24384 cve-icon cve-icon
http://secunia.com/advisories/24389 cve-icon cve-icon
http://secunia.com/advisories/24393 cve-icon cve-icon
http://secunia.com/advisories/24395 cve-icon cve-icon
http://secunia.com/advisories/24406 cve-icon cve-icon
http://secunia.com/advisories/24410 cve-icon cve-icon
http://secunia.com/advisories/24437 cve-icon cve-icon
http://secunia.com/advisories/24455 cve-icon cve-icon
http://secunia.com/advisories/24456 cve-icon cve-icon
http://secunia.com/advisories/24457 cve-icon cve-icon
http://secunia.com/advisories/24522 cve-icon cve-icon
http://secunia.com/advisories/24650 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200703-04.xml cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200703-18.xml cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml cve-icon cve-icon
http://www.kb.cert.org/vuls/id/269484 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:050 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:052 cve-icon cve-icon
http://www.mozilla.org/security/announce/2007/mfsa2007-01.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html cve-icon cve-icon
http://www.osvdb.org/32115 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0078.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0079.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0097.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0108.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/461336/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/461809/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/22694 cve-icon cve-icon
http://www.securitytracker.com/id?1017698 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-428-1 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-431-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/0718 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/0719 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0083 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/32699 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1081 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1103 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-0777 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11331 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-0777 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T12:34:19.814Z

Reserved: 2007-02-06T00:00:00

Link: CVE-2007-0777

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2007-02-26T19:28:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2007-0777

cve-icon Redhat

Severity : Critical

Publid Date: 2007-02-23T00:00:00Z

Links: CVE-2007-0777 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses