Description
Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
Published: 2007-02-16
Score: 7.5 High
EPSS: 16.4% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1336-1 New mozilla-firefox packages fix several vulnerabilities
Ubuntu USN Ubuntu USN USN-428-1 Firefox vulnerabilities
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc cve-icon cve-icon
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc cve-icon cve-icon
http://fedoranews.org/cms/node/2713 cve-icon cve-icon
http://fedoranews.org/cms/node/2728 cve-icon cve-icon
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 cve-icon cve-icon
http://lcamtuf.dione.cc/ffhostname.html cve-icon cve-icon
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2007-0077.html cve-icon cve-icon
http://secunia.com/advisories/24175 cve-icon cve-icon
http://secunia.com/advisories/24205 cve-icon cve-icon
http://secunia.com/advisories/24238 cve-icon cve-icon
http://secunia.com/advisories/24287 cve-icon cve-icon
http://secunia.com/advisories/24290 cve-icon cve-icon
http://secunia.com/advisories/24293 cve-icon cve-icon
http://secunia.com/advisories/24320 cve-icon cve-icon
http://secunia.com/advisories/24328 cve-icon cve-icon
http://secunia.com/advisories/24333 cve-icon cve-icon
http://secunia.com/advisories/24342 cve-icon cve-icon
http://secunia.com/advisories/24343 cve-icon cve-icon
http://secunia.com/advisories/24384 cve-icon cve-icon
http://secunia.com/advisories/24393 cve-icon cve-icon
http://secunia.com/advisories/24395 cve-icon cve-icon
http://secunia.com/advisories/24437 cve-icon cve-icon
http://secunia.com/advisories/24455 cve-icon cve-icon
http://secunia.com/advisories/24457 cve-icon cve-icon
http://secunia.com/advisories/24650 cve-icon cve-icon
http://secunia.com/advisories/25588 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200703-04.xml cve-icon cve-icon
http://securityreason.com/securityalert/2262 cve-icon cve-icon
http://securitytracker.com/id?1017654 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 cve-icon cve-icon
http://www.debian.org/security/2007/dsa-1336 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml cve-icon cve-icon
http://www.kb.cert.org/vuls/id/885753 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:050 cve-icon cve-icon
http://www.mozilla.org/security/announce/2007/mfsa2007-07.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html cve-icon cve-icon
http://www.osvdb.org/32104 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0078.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0079.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0097.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0108.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/460126/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/460217/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/461336/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/461809/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/22566 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-428-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/0624 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/0718 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0083 cve-icon cve-icon
https://bugzilla.mozilla.org/show_bug.cgi?id=370445 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/32533 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1081 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1103 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-0981 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9730 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-0981 cve-icon
History

No history.

Subscriptions

Mozilla Firefox Seamonkey
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T12:43:21.623Z

Reserved: 2007-02-15T00:00:00.000Z

Link: CVE-2007-0981

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2007-02-16T01:28:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2007-0981

cve-icon Redhat

Severity : Moderate

Publid Date: 2007-02-23T00:00:00Z

Links: CVE-2007-0981 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses