Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1344-1 | New iceweasel packages fix several vulnerabilities |
Debian DSA |
DSA-1345-1 | New xulrunner packages fix several vulnerabilities |
Debian DSA |
DSA-1346-1 | New iceape packages fix several vulnerabilities |
Debian DSA |
DSA-1391-1 | New icedove packages fix several vulnerabilities |
Ubuntu USN |
USN-493-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-503-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T14:28:52.497Z
Reserved: 2007-07-18T00:00:00
Link: CVE-2007-3844
No data.
Status : Deferred
Published: 2007-08-08T01:17:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-3844
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN