The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.

Project Subscriptions

Vendors Products
Mozilla Subscribe
Firefox Subscribe
Seamonkey Subscribe
Thunderbird Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-1751-1 New xulrunner packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1830-1 New icedove packages fix several vulnerabilities
EUVD EUVD EUVD-2009-0771 The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
Ubuntu USN Ubuntu USN USN-728-1 Firefox and Xulrunner vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html cve-icon cve-icon
http://secunia.com/advisories/34140 cve-icon cve-icon
http://secunia.com/advisories/34145 cve-icon cve-icon
http://secunia.com/advisories/34272 cve-icon cve-icon
http://secunia.com/advisories/34383 cve-icon cve-icon
http://secunia.com/advisories/34462 cve-icon cve-icon
http://secunia.com/advisories/34464 cve-icon cve-icon
http://secunia.com/advisories/34527 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm cve-icon cve-icon
http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1751 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1830 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2009:075 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2009:083 cve-icon cve-icon
http://www.mozilla.org/security/announce/2009/mfsa2009-07.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-0315.html cve-icon cve-icon
http://www.securityfocus.com/bid/33990 cve-icon cve-icon
http://www.securitytracker.com/id?1021795 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/0632 cve-icon cve-icon
https://bugzilla.mozilla.org/buglist.cgi?bug_id=424276%2C435209%2C436965%2C460706%2C466057%2C468578%2C471594%2C472502 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2009-0771 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11314 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5250 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6163 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6196 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6755 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2009-0771 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T04:48:51.873Z

Reserved: 2009-03-03T00:00:00

Link: CVE-2009-0771

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2009-03-05T02:30:00.390

Modified: 2025-04-09T00:30:58.490

Link: CVE-2009-0771

cve-icon Redhat

Severity : Critical

Publid Date: 2009-03-04T00:00:00Z

Links: CVE-2009-0771 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses