{"vuid":"VU#393921","idnumber":"393921","name":"Mozilla Firefox fails to properly handle JavaScript onUnload events","keywords":["Mozilla Firefox","memory corruption","onUnload event handler"],"overview":"Mozilla Firefox does not properly handle JavaScript onUnload events. This vulnerability may lead to memory corruption that could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"The JavaScript onUnload event is executed when the browser exits a web page. An event handler can be installed via JavaScript to trap and process this event. Mozilla Firefox fails to properly handle JavaScript onUnload events. Specifically, Firefox may not correctly handle freed data structures modified in the onUnload event handler, which could cause memory corruption.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.","resolution":"Upgrade\nFirefox has addressed this issue in Firefox version 2.0.0.2 as well as Firefox 1.5.0.10. See Mozilla Foundation Security Advisory 2007-08 for more information","workarounds":"Disable JavaScript Disabling JavaScript will prevent exploitation of this vulnerability. For instructions on disabling JavaScript in Mozilla Firefox, refer to the Mozilla Firefox section the Securing Your Web Browser document.","sysaffected":"","thanks":"This vulnerability was publicly disclosed by Michal Zalewski.","author":"This document was written by Jeff Gennari.","public":["http://www.mozilla.org/security/announce/2007/mfsa2007-08.html","https://bugzilla.mozilla.org/show_bug.cgi?id=371321","http://secunia.com/advisories/24333/","http://secunia.com/advisories/24384/","http://secunia.com/advisories/24432/"],"cveids":["CVE-2007-1092"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-02-23T12:48:30Z","publicdate":"2007-02-22T00:00:00Z","datefirstpublished":"2007-02-23T15:02:52Z","dateupdated":"2007-03-07T15:35:23Z","revision":30,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"17","cam_impact":"20","cam_easeofexploitation":"6","cam_attackeraccessrequired":"20","cam_scorecurrent":"18.36","cam_scorecurrentwidelyknown":"18.36","cam_scorecurrentwidelyknownexploited":"33.66","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":18.36,"vulnote":null}