The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1649-1 | New iceweasel packages fix several vulnerabilities |
![]() |
DSA-1669-1 | New xulrunner packages fix several vulnerabilities |
![]() |
DSA-1696-1 | New icedove packages fix several vulnerabilities |
![]() |
DSA-1697-1 | New iceape packages fix several vulnerabilities |
![]() |
EUVD-2008-3821 | The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors. |
![]() |
USN-645-1 | Firefox and xulrunner vulnerabilities |
![]() |
USN-645-2 | Firefox vulnerabilities |
![]() |
USN-647-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T09:53:00.349Z
Reserved: 2008-08-27T00:00:00
Link: CVE-2008-3835

No data.

Status : Deferred
Published: 2008-09-24T20:37:04.470
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-3835


No data.