Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1336-1 | New mozilla-firefox packages fix several vulnerabilities |
Ubuntu USN |
USN-428-1 | Firefox vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:43:21.623Z
Reserved: 2007-02-15T00:00:00
Link: CVE-2007-0981
No data.
Status : Deferred
Published: 2007-02-16T01:28:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-0981
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN