Vulnerability Name: | CVE-2004-0908 (CCN-17376) |
Assigned: | 2004-08-31 |
Published: | 2004-08-31 |
Updated: | 2017-10-11 |
Summary: | Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows untrusted Javascript code to read and write to the clipboard, and possibly obtain sensitive information, via script-generated events such as Ctrl-Ins. |
CVSS v3 Severity: | 4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): None | 4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Data Manipulation |
References: | Source: CCN Type: Mozilla Bugzilla Bug 257523 Text fields give scripts access to the user's clipboard
Source: CONFIRM Type: Exploit, Patch http://bugzilla.mozilla.org/show_bug.cgi?id=257523
Source: MITRE Type: CNA CVE-2004-0908
Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:877 New upstream for mozilla
Source: HP Type: UNKNOWN SSRT4826
Source: FEDORA Type: UNKNOWN FLSA:2089
Source: CCN Type: RHSA-2004-486 mozilla security update
Source: CCN Type: SA12526 Mozilla Multiple Vulnerabilities
Source: SECUNIA Type: UNKNOWN 12526
Source: GENTOO Type: UNKNOWN GLSA-200409-26
Source: CCN Type: slackware-security Mailing List, Wed, 22 Sep 2004 13:39:12 -0700 (PDT) [slackware-security] Mozilla (SSA:2004-266-03)
Source: CCN Type: Sun Alert ID: 57701 Multiple Security Vulnerabilities in Mozilla
Source: CCN Type: GLSA-200409-26 Mozilla, Firefox, Thunderbird, Epiphany: New releases fix vulnerabilities
Source: CCN Type: US-CERT VU#460528 Mozilla fails to properly handle script-generated events
Source: CERT-VN Type: US Government Resource VU#460528
Source: CCN Type: Mozilla Web site Mozilla - Home of the Firefox web browser, Thunderbird and the Mozilla Suite
Source: CONFIRM Type: UNKNOWN http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
Source: SUSE Type: Patch SUSE-SA:2004:036
Source: BID Type: Exploit, Patch 11179
Source: CCN Type: BID-11179 Mozilla/Firefox Browsers Unauthorized Clipboard Contents Disclosure
Source: XF Type: UNKNOWN mozilla-shortcut-clipboard-access(17376)
Source: XF Type: UNKNOWN mozilla-shortcut-clipboard-access(17376)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9745
Source: SUSE Type: SUSE-SA:2004:036 mozilla: various vulnerabilities
|
Vulnerable Configuration: | Configuration 1: cpe:/a:mozilla:mozilla:0.8:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.7:-:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.8:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.9:rc:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*OR cpe:/a:netscape:navigator:7.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.9:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.7:-:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.7:*:*:*:*:*:*:*AND cpe:/o:sun:solaris:8::sparc:*:*:*:*:*OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:*OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:*OR cpe:/o:compaq:tru64:5.1b:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:*OR cpe:/o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
mozilla mozilla 0.8
mozilla mozilla 0.9.2
mozilla mozilla 0.9.2.1
mozilla mozilla 0.9.3
mozilla mozilla 0.9.4
mozilla mozilla 0.9.4.1
mozilla mozilla 0.9.5
mozilla mozilla 0.9.6
mozilla mozilla 0.9.7
mozilla mozilla 0.9.8
mozilla mozilla 0.9.9
mozilla mozilla 0.9.35
mozilla mozilla 0.9.48
mozilla mozilla 1.0
mozilla mozilla 1.0 rc1
mozilla mozilla 1.0 rc2
mozilla mozilla 1.0.1
mozilla mozilla 1.0.2
mozilla mozilla 1.1
mozilla mozilla 1.1 alpha
mozilla mozilla 1.1 beta
mozilla mozilla 1.2
mozilla mozilla 1.2 alpha
mozilla mozilla 1.2 beta
mozilla mozilla 1.2.1
mozilla mozilla 1.3
mozilla mozilla 1.3.1
mozilla mozilla 1.4
mozilla mozilla 1.4 alpha
mozilla mozilla 1.4 beta
mozilla mozilla 1.4.1
mozilla mozilla 1.4.2
mozilla mozilla 1.4.4
mozilla mozilla 1.5
mozilla mozilla 1.5.1
mozilla mozilla 1.6
mozilla mozilla 1.7
mozilla mozilla 1.7 alpha
mozilla mozilla 1.7 beta
mozilla mozilla 1.7 rc1
mozilla mozilla 1.7 rc2
mozilla mozilla 1.7 rc3
mozilla mozilla 1.7.1
mozilla mozilla 1.7.2
mozilla thunderbird 0.1
mozilla thunderbird 0.2
mozilla thunderbird 0.3
mozilla thunderbird 0.4
mozilla thunderbird 0.5
mozilla thunderbird 0.6
mozilla thunderbird 0.7
mozilla thunderbird 0.7.1
mozilla thunderbird 0.7.2
mozilla mozilla 1.0 rc1
mozilla mozilla 1.0
mozilla mozilla 1.0.1
mozilla mozilla 1.1
mozilla mozilla 1.2.1
mozilla mozilla 1.3
mozilla mozilla 1.4
mozilla mozilla 1.3.1
mozilla mozilla 1.6
mozilla mozilla 1.7 rc3
mozilla firefox 0.8
mozilla firefox 0.9 rc
mozilla mozilla 1.7
mozilla mozilla 1.7.1
mozilla firefox 0.9.2
mozilla firefox 0.9.1
mozilla firefox 0.9.3
netscape navigator 7.2
mozilla mozilla 1.7.2
mozilla firefox 0.9
mozilla mozilla 0.9.2
mozilla mozilla 1.0.2
mozilla mozilla 1.1 alpha
mozilla mozilla 1.1 beta
mozilla mozilla 1.2
mozilla mozilla 1.2 alpha
mozilla mozilla 1.2 beta
mozilla mozilla 1.4.1
mozilla mozilla 1.4.2
mozilla mozilla 1.4.4
mozilla mozilla 1.4 alpha
mozilla mozilla 1.4 beta
mozilla mozilla 1.5
mozilla mozilla 1.5.1
mozilla mozilla 1.5 alpha
mozilla mozilla 1.5 rc1
mozilla mozilla 1.5 rc2
mozilla mozilla 1.6 alpha
mozilla mozilla 1.6 beta
mozilla mozilla 1.7 alpha
mozilla mozilla 1.7 beta
mozilla mozilla 1.7 rc1
mozilla mozilla 1.7 rc2
mozilla thunderbird 0.1
mozilla thunderbird 0.2
mozilla thunderbird 0.3
mozilla thunderbird 0.4
mozilla thunderbird 0.5
mozilla thunderbird 0.6
mozilla thunderbird 0.7
mozilla thunderbird 0.7.1
mozilla thunderbird 0.7.2
mozilla thunderbird 0.7.3
mozilla firefox 0.7
sun solaris 8
compaq tru64 5.1a
sun solaris 9
gentoo linux *
suse suse linux 8.1
suse linux enterprise server 8
slackware slackware linux current
compaq tru64 5.1b
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
suse suse linux 8.2
redhat enterprise linux 2.1
conectiva linux 9.0
suse suse linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux 10.0
suse suse linux 9.1
redhat enterprise linux 3
conectiva linux 10
slackware slackware linux 10.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 10.0