Vulnerability Description
Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | <= 2.0.0.1 |
| Mozilla | Seamonkey | <= 1.0.7 |
| Mozilla | Thunderbird | <= 1.5.0.9 |
Related Weaknesses (CWE)
References
- http://fedoranews.org/cms/node/2713
- http://fedoranews.org/cms/node/2728
- http://fedoranews.org/cms/node/2747
- http://fedoranews.org/cms/node/2749
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
- http://secunia.com/advisories/24205Vendor Advisory
- http://secunia.com/advisories/24238Vendor Advisory
- http://secunia.com/advisories/24252Vendor Advisory
- http://secunia.com/advisories/24293Vendor Advisory
- http://secunia.com/advisories/24320Vendor Advisory
- http://secunia.com/advisories/24328Vendor Advisory
- http://secunia.com/advisories/24333Vendor Advisory
- http://secunia.com/advisories/24384Vendor Advisory
- http://secunia.com/advisories/24389Vendor Advisory
FAQ
What is CVE-2007-0776?
CVE-2007-0776 is a vulnerability with a CVSS score of 9.3 (HIGH). Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary c...
How severe is CVE-2007-0776?
CVE-2007-0776 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0776?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird.