{"vuid":"VU#751636","idnumber":"751636","name":"Mozilla Layout Engine memory corruption vulnerabilities","keywords":["Mozilla","layout engine","memory corruption","arbitrary code execution","malformed JavaScript code","Mozilla_20070531"],"overview":"The Mozilla layout engine contains multiple vulnerabilities that may lead to memory corruption. These vulnerabilities may allow an attacker to execute code or cause a denial-of-service condition.","clean_desc":"The Mozilla Layout Engine contains an multiple vulnerabilities that may result in memory corruption. The impacts of these vulnerabilities vary. According to Mozilla Foundation Security Advisory 2007-12: Some of these crashes that showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Information about the individual bug reports addressed in this update can be found in Mozilla Foundation Security Advisory 2007-12.","impact":"Potential consequences include remote execution of arbitrary code and denial of service.","resolution":"Upgrade\nThese vulnerabilities are addressed in Firefox 2.0.0.4,  Firefox 1.5.0.12, Thunderbird 2.0.0.4, Thunderbird 1.5.0.12, SeaMonkey 1.0.9, SeaMonkey 1.1.2.","workarounds":"","sysaffected":"","thanks":"These vulnerabilities were reported in Mozilla Foundation Security Advisory \n2007-12\n. Mozilla credits Boris Zbarsky, Eli Friedman, Georgi Guninski, Jesse Ruderman, Martijn Wargers and Olli Pettay with reporting these issues.","author":"This document was written by Jeff Gennari.","public":["http://www.mozilla.org/security/announce/2007/mfsa2007-12.html","https://bugzilla.mozilla.org/show_bug.cgi?id=377216","https://bugzilla.mozilla.org/show_bug.cgi?id=370360","https://bugzilla.mozilla.org/show_bug.cgi?id=372285","https://bugzilla.mozilla.org/show_bug.cgi?id=306902","https://bugzilla.mozilla.org/show_bug.cgi?id=348492","https://bugzilla.mozilla.org/show_bug.cgi?id=369150","https://bugzilla.mozilla.org/show_bug.cgi?id=369249","https://bugzilla.mozilla.org/show_bug.cgi?id=372237","https://bugzilla.mozilla.org/show_bug.cgi?id=372376","https://bugzilla.mozilla.org/show_bug.cgi?id=376223","https://bugzilla.mozilla.org/show_bug.cgi?id=336574","https://bugzilla.mozilla.org/show_bug.cgi?id=336744","https://bugzilla.mozilla.org/show_bug.cgi?id=336994","https://bugzilla.mozilla.org/show_bug.cgi?id=362708","https://bugzilla.mozilla.org/show_bug.cgi?id=369542","https://bugzilla.mozilla.org/show_bug.cgi?id=371124","https://bugzilla.mozilla.org/show_bug.cgi?id=378273","https://bugzilla.mozilla.org/show_bug.cgi?id=378325","https://bugzilla.mozilla.org/show_bug.cgi?id=374584","https://bugzilla.mozilla.org/show_bug.cgi?id=375196"],"cveids":["CVE-2007-2867"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-05-31T12:20:24Z","publicdate":"2007-05-31T00:00:00Z","datefirstpublished":"2007-05-31T13:34:37Z","dateupdated":"2007-06-20T20:10:03Z","revision":31,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"19","cam_easeofexploitation":"11","cam_attackeraccessrequired":"19","cam_scorecurrent":"8.1901875","cam_scorecurrentwidelyknown":"17.1249375","cam_scorecurrentwidelyknownexploited":"32.0161875","ipprotocol":"tcp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.1901875,"vulnote":null}