Vulnerability Name: CVE-2008-3837 (CCN-45348) Assigned: 2008-09-23 Published: 2008-09-23 Updated: 2018-11-01 Summary: Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, and SeaMonkey before 1.1.12, allow user-assisted remote attackers to move a window during a mouse click, and possibly force a file download or unspecified other drag-and-drop action, via a crafted onmousedown action that calls window.moveBy, a variant of CVE-2003-0823 . CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N )3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
Vulnerability Type: CWE-Other Vulnerability Consequences: Other References: Source: MITRE Type: CNACVE-2008-3837 Source: CONFIRM Type: Third Party Advisoryhttp://download.novell.com/Download?buildid=WZXONb-tqBw~ Source: SUSE Type: Third Party AdvisorySUSE-SA:2008:050 Source: CCN Type: RHSA-2008-0879Critical: firefox security update Source: CCN Type: RHSA-2008-0882Critical: seamonkey security update Source: CCN Type: SA31984Mozilla Firefox 2 Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory31984 Source: SECUNIA Type: Third Party Advisory31985 Source: SECUNIA Type: Third Party Advisory31987 Source: CCN Type: SA32010Mozilla SeaMonkey Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory32010 Source: CCN Type: SA32011Mozilla Firefox 3 Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory32011 Source: SECUNIA Type: Third Party Advisory32012 Source: SECUNIA Type: Third Party Advisory32042 Source: SECUNIA Type: Third Party Advisory32044 Source: SECUNIA Type: Third Party Advisory32089 Source: SECUNIA Type: Third Party Advisory32095 Source: SECUNIA Type: Third Party Advisory32096 Source: SECUNIA Type: Third Party Advisory32144 Source: SECUNIA Type: Third Party Advisory32185 Source: SECUNIA Type: Third Party Advisory32196 Source: SECUNIA Type: Third Party Advisory32845 Source: SECUNIA Type: Third Party Advisory33433 Source: CCN Type: SA34501Sun Solaris Firefox Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory34501 Source: CCN Type: SECTRACK ID: 1020922Mozilla Firefox May Let Remote Users Hijack User Clicks to Perform Certain Actions Source: SLACKWARE Type: Third Party AdvisorySSA:2008-269-02 Source: SLACKWARE Type: Third Party AdvisorySSA:2008-269-01 Source: SUNALERT Type: Broken Link256408 Source: CCN Type: Sun Alert ID: 256408Multiple Security Vulnerabilities in Firefox Versions Before 2.0.0.19 May Allow Execution of Arbitrary Code or Access to Unauthorized Data Source: CCN Type: ASA-2008-421seamonkey security update (RHSA-2008-0882) Source: CCN Type: ASA-2008-422firefox security update (RHSA-2008-0879) Source: CCN Type: ASA-2009-158Multiple Security Vulnerabilities in Firefox Versions Before 2.0.0.19 May Allow Execution of Arbitrary Code or Access to unauthorized Data (Sun 256408) Source: CCN Type: NORTEL BULLETIN ID: 2009009505, Rev 1Nortel Response to Sun Alert 256408 - Solaris 10 - Vulnerabilities in Firefox May Allow Execution of Arbitrary Code Source: DEBIAN Type: Third Party AdvisoryDSA-1649 Source: DEBIAN Type: Third Party AdvisoryDSA-1669 Source: DEBIAN Type: Third Party AdvisoryDSA-1697 Source: DEBIAN Type: DSA-1649iceweasel -- several vulnerabilities Source: DEBIAN Type: DSA-1669xulrunner -- several vulnerabilities Source: DEBIAN Type: DSA-1697iceape -- several vulnerabilities Source: MANDRIVA Type: Third Party AdvisoryMDVSA-2008:205 Source: CCN Type: MFSA 2008-40Forced mouse drag Source: CONFIRM Type: Vendor Advisoryhttp://www.mozilla.org/security/announce/2008/mfsa2008-40.html Source: REDHAT Type: Third Party AdvisoryRHSA-2008:0879 Source: REDHAT Type: Third Party AdvisoryRHSA-2008:0882 Source: BID Type: Third Party Advisory, VDB Entry31346 Source: CCN Type: BID-31346Mozilla Firefox/SeaMonkey/Thunderbird Multiple Remote Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry1020922 Source: CCN Type: USN-645-1Firefox and xulrunner vulnerabilities Source: UBUNTU Type: Third Party AdvisoryUSN-645-1 Source: CCN Type: USN-645-2Firefox vulnerabilities Source: UBUNTU Type: Third Party AdvisoryUSN-645-2 Source: CCN Type: USN-645-3Firefox and xulrunner regression Source: VUPEN Type: Third Party AdvisoryADV-2008-2661 Source: VUPEN Type: Third Party AdvisoryADV-2009-0977 Source: CCN Type: Bugzilla@Mozilla - Bug 329385Attacker can force mouse drag Source: CONFIRM Type: Issue Tracking, Patch, Vendor Advisoryhttps://bugzilla.mozilla.org/show_bug.cgi?id=329385 Source: XF Type: Third Party Advisory, VDB Entryfirefox-draganddrop-weak-security(45348) Source: XF Type: UNKNOWNfirefox-draganddrop-weak-security(45348) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:9950 Source: FEDORA Type: Third Party AdvisoryFEDORA-2008-8425 Source: FEDORA Type: Third Party AdvisoryFEDORA-2008-8401 Source: FEDORA Type: Third Party AdvisoryFEDORA-2008-8429 Source: SUSE Type: SUSE-SA:2008:050Mozilla security problems Vulnerable Configuration: Configuration 1 :cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version < 2.0.0.17)OR cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version >= 3.0 and < 3.0.2) OR cpe:/a:mozilla:seamonkey:*:*:*:*:*:*:*:* (Version < 1.1.12) Configuration 2 :cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:* Configuration 3 :cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* OR cpe:/o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:mozilla:firefox:2.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:3.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:3.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:* OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
mozilla firefox *
mozilla firefox *
mozilla seamonkey *
debian debian linux 4.0
canonical ubuntu linux 6.06
canonical ubuntu linux 7.04
canonical ubuntu linux 7.10
canonical ubuntu linux 8.04
mozilla firefox 2.0
mozilla firefox 2.0.0.1
mozilla firefox 2.0.0.2
mozilla firefox 2.0.0.3
mozilla firefox 2.0.0.4
mozilla firefox 2.0.0.5
mozilla seamonkey 1.1.3
mozilla firefox 2.0.0.6
mozilla firefox 2.0.0.9
mozilla seamonkey 1.1.2
mozilla seamonkey 1.1.1
mozilla firefox 2.0.0.7
mozilla seamonkey 1.1.4
mozilla firefox 2.0.0.8
mozilla seamonkey 1.1.5
mozilla seamonkey 1.1.6
mozilla firefox 2.0.0.11
mozilla firefox 2.0.0.12
mozilla firefox 2.0.0.10
mozilla firefox 2.0.0.13
mozilla seamonkey 1.1.7
mozilla seamonkey 1.1.8
mozilla seamonkey 1.1.9
mozilla firefox 2.0.0.14
mozilla firefox 3.0
mozilla firefox 2.0.0.15
mozilla firefox 3.0.1
mozilla seamonkey 1.1.10
mozilla seamonkey 1.1.11
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
suse suse linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
novell linux desktop 9
redhat enterprise linux 4
redhat enterprise linux 4
redhat linux advanced workstation 2.1
canonical ubuntu 6.06
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
debian debian linux 4.0
canonical ubuntu 7.04
redhat enterprise linux 5
canonical ubuntu 7.10
mandrakesoft mandrake linux 2008.0
mandrakesoft mandrake linux 2008.1 x86_64
novell open enterprise server *
novell opensuse 10.2
novell opensuse 10.3
mandrakesoft mandrake linux 2008.1
canonical ubuntu 8.04
novell opensuse 11.0
novell suse linux enterprise server 10 sp2