Vulnerability Name: CVE-2007-0778 (CCN-32671) Assigned: 2007-02-23 Published: 2007-02-23 Updated: 2019-10-09 Summary: The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache. CVSS v3 Severity: 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): NoneAvailibility (A): None
CVSS v2 Severity: 5.4 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:N/A:N )4.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:N/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): NoneAvailibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N )1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
Vulnerability Type: CWE-200 Vulnerability Consequences: Obtain Information References: Source: SGI Type: Broken Link20070202-01-P Source: SGI Type: Broken Link20070301-01-P Source: MITRE Type: CNACVE-2007-0778 Source: FEDORA Type: Broken LinkFEDORA-2007-281 Source: FEDORA Type: Broken LinkFEDORA-2007-293 Source: HP Type: Broken LinkHPSBUX02153 Source: SUSE Type: Broken LinkSUSE-SA:2007:019 Source: CCN Type: RHSA-2007-0077Critical: seamonkey security update Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0077 Source: CCN Type: RHSA-2007-0078Critical: thunderbird security update Source: CCN Type: RHSA-2007-0079Critical: Firefox security update Source: CCN Type: RHSA-2007-0097Critical: firefox security update Source: CCN Type: RHSA-2007-0108Critical: thunderbird security update Source: CCN Type: SA24205Mozilla Firefox Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory24205 Source: CCN Type: SA24238Mozilla SeaMonkey Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory24238 Source: SECUNIA Type: Third Party Advisory24287 Source: SECUNIA Type: Third Party Advisory24290 Source: SECUNIA Type: Third Party Advisory24293 Source: SECUNIA Type: Third Party Advisory24320 Source: SECUNIA Type: Third Party Advisory24328 Source: SECUNIA Type: Third Party Advisory24333 Source: SECUNIA Type: Third Party Advisory24342 Source: SECUNIA Type: Third Party Advisory24343 Source: SECUNIA Type: Third Party Advisory24384 Source: SECUNIA Type: Third Party Advisory24393 Source: SECUNIA Type: Third Party Advisory24395 Source: SECUNIA Type: Third Party Advisory24437 Source: SECUNIA Type: Third Party Advisory24455 Source: SECUNIA Type: Third Party Advisory24457 Source: SECUNIA Type: Third Party Advisory24650 Source: SECUNIA Type: Third Party Advisory25588 Source: GENTOO Type: Third Party AdvisoryGLSA-200703-04 Source: CCN Type: SECTRACK ID: 1017699Mozilla Firefox Cache Collision May Let Remote Users Obtain Cached Web Page Contents Source: SECTRACK Type: Third Party Advisory, VDB Entry1017699 Source: SLACKWARE Type: Mailing List, Third Party AdvisorySSA:2007-066-05 Source: SLACKWARE Type: Mailing List, Third Party AdvisorySSA:2007-066-03 Source: CCN Type: ASA-2007-092SeaMonkey security update (RHSA-2007-0077) Source: CCN Type: ASA-2007-095thunderbird security update (RHSA-2007-0078) Source: CCN Type: ASA-2007-114Firefox security update (RHSA-2007-0079) Source: DEBIAN Type: Third Party AdvisoryDSA-1336 Source: DEBIAN Type: DSA-1336mozilla-firefox -- several vulnerabilities Source: CCN Type: GLSA-200703-04Mozilla Firefox: Multiple vulnerabilities Source: CCN Type: GLSA-200703-08SeaMonkey: Multiple vulnerabilities Source: GENTOO Type: Third Party AdvisoryGLSA-200703-08 Source: MANDRIVA Type: Third Party AdvisoryMDKSA-2007:050 Source: CCN Type: MFSA 2007-03Information disclosure through cache collisions Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.mozilla.org/security/announce/2007/mfsa2007-03.html Source: SUSE Type: Broken LinkSUSE-SA:2007:022 Source: OSVDB Type: Broken Link32110 Source: CCN Type: OSVDB ID: 32110Mozilla Multiple Products Cache Collision Information Disclosure Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0078 Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0079 Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0097 Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0108 Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20070226 rPSA-2007-0040-1 firefox Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20070303 rPSA-2007-0040-3 firefox thunderbird Source: BID Type: Third Party Advisory, VDB Entry22694 Source: CCN Type: BID-22694Mozilla Thunderbird/SeaMonkey/Firefox Multiple Remote Vulnerabilities Source: CCN Type: USN-428-1Firefox vulnerabilities Source: UBUNTU Type: Third Party AdvisoryUSN-428-1 Source: CCN Type: USN-428-2Firefox regression Source: VUPEN Type: Third Party AdvisoryADV-2007-0718 Source: VUPEN Type: Third Party AdvisoryADV-2008-0083 Source: MISC Type: Issue Trackinghttps://bugzilla.mozilla.org/show_bug.cgi?id=347852 Source: XF Type: Third Party Advisory, VDB Entrymozilla-diskcache-information-disclosure(32671) Source: XF Type: UNKNOWNmozilla-diskcache-information-disclosure(32671) Source: CONFIRM Type: Broken Linkhttps://issues.rpath.com/browse/RPL-1081 Source: CONFIRM Type: Broken Linkhttps://issues.rpath.com/browse/RPL-1103 Source: OVAL Type: Broken Linkoval:org.mitre.oval:def:9151 Source: SUSE Type: SUSE-SA:2007:019MozillaFirefox security update 1.5.0.10/2.0.0.2 Source: SUSE Type: SUSE-SA:2007:022Mozilla security problems Vulnerable Configuration: Configuration 1 :cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version >= 1.5 and < 1.5.0.10)OR cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version >= 2.0 and < 2.0.0.2) OR cpe:/a:mozilla:seamonkey:*:*:*:*:*:*:*:* (Version < 1.0.8) Configuration 2 :cpe:/o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* Configuration 3 :cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:mozilla:firefox:1.5:beta1:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0:beta1:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0:rc2:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0:rc3:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::alpha:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::beta:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
mozilla firefox *
mozilla firefox *
mozilla seamonkey *
canonical ubuntu linux 5.10
canonical ubuntu linux 6.06
canonical ubuntu linux 6.10
debian debian linux 3.1
mozilla firefox 1.5 beta1
mozilla firefox 2.0
mozilla firefox 1.5.0.2
mozilla firefox 1.5.0.3
mozilla firefox 1.5.0.4
mozilla firefox 1.5.0.6
mozilla firefox 1.5.0.7
mozilla seamonkey 1.0.5
mozilla seamonkey 1.0.7
mozilla seamonkey 1.0.2
mozilla firefox 1.5.0.9
mozilla firefox 2.0.0.1
mozilla firefox 2.0 beta1
mozilla firefox 2.0 rc2
mozilla firefox 2.0 rc3
mozilla seamonkey 1.0
mozilla seamonkey 1.0.1
mozilla seamonkey 1.0.3
mozilla seamonkey 1.0.4
mozilla seamonkey 1.0.6
mozilla firefox 1.0.5
mozilla firefox 1.5.0.1
mozilla firefox 1.5.0.5
mozilla firefox 1.5.0.8
mozilla firefox 1.5 beta2
mozilla seamonkey 1.0
mozilla seamonkey 1.0
gentoo linux *
suse linux enterprise server 8
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
suse suse linux school server -
redhat enterprise linux 3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
novell linux desktop 9
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
novell open enterprise server *
suse suse linux 10.0
redhat linux advanced workstation 2.1
canonical ubuntu 6.06
suse suse linux 10.1
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux desktop 5.0
redhat enterprise linux 5
redhat enterprise linux 5
redhat enterprise linux 5
novell open enterprise server *
novell opensuse 10.2
suse suse linux 9.3