fkie_cve-2010-0220
Vulnerability from fkie_nvd
Published
2010-01-07 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
The nsObserverList::FillObserverArray function in xpcom/ds/nsObserverList.cpp in Mozilla Firefox before 3.5.7 allows remote attackers to cause a denial of service (application crash) via a crafted web site that triggers memory consumption and an accompanying Low Memory alert dialog, and also triggers attempted removal of an observer from an empty observers array.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", matchCriteriaId: "774AD391-24F2-47B9-A8E4-6B6E3BEE5AFC", versionEndIncluding: "3.5.6", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", matchCriteriaId: "7C7AA88B-638A-451A-B235-A1A1444BE417", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", matchCriteriaId: "9C01AD7C-8470-47AB-B8AE-670E3A381E89", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", matchCriteriaId: "7E43F2F1-9252-4B44-8A61-D05305915A5F", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", matchCriteriaId: "3BB9D48B-DC7B-4D92-BB26-B6DE629A2506", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", matchCriteriaId: "A360D595-A829-4DDE-932E-9995626917E5", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", matchCriteriaId: "6E9B5349-FAA7-4CDA-9533-1AD1ACDFAC4E", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", matchCriteriaId: "07243837-C353-4C25-A5B1-4DA32807E97D", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", matchCriteriaId: "B832C034-F793-415F-BFC8-D97A18BA6BC7", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", matchCriteriaId: "83CD1A13-66CB-49CC-BD84-5D8334DB774A", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", matchCriteriaId: "93C142C5-3A85-432B-80D6-2E7B1B4694F4", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", matchCriteriaId: "2434FCE7-A50B-4527-9970-C7224B31141C", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", matchCriteriaId: "5633FB6E-D623-49D4-9858-4E20E64DE458", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", matchCriteriaId: "429ECA02-DBCD-45FB-942C-CA4BC1BC8A72", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", matchCriteriaId: "B5F0DC80-5473-465C-9D7F-9589F1B78E12", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", matchCriteriaId: "567FF916-7DE0-403C-8528-7931A43E0D18", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", matchCriteriaId: "010B34F4-910E-4515-990B-8E72DF009578", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", matchCriteriaId: "8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", matchCriteriaId: "5A545A77-2198-4685-A87F-E0F2DAECECF6", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", matchCriteriaId: "438AACF8-006F-4522-853F-30DBBABD8C15", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "778FAE0C-A5CF-4B67-93A9-1A803E3E699F", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "E7447185-7509-449D-8907-F30A42CF7EB5", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "0EDBAC37-9D08-44D1-B279-BC6ACF126CAF", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "3FFF89FA-2020-43CC-BACD-D66117B3DD26", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "834BB391-5EB5-43A8-980A-D305EDAE6FA7", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "9A38AD88-BAA6-4FBE-885B-69E951BD1EFE", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "B500EE6C-99DB-49A3-A1F1-AFFD7FE28068", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", matchCriteriaId: "4F2938F2-A801-45E5-8E06-BE03DE03C8A7", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F18A45C0-419C-4723-AB7D-5880EF668CE9", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", matchCriteriaId: "ABB88E86-6E83-4A59-9266-8B98AA91774D", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", matchCriteriaId: "E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", matchCriteriaId: "66BE50FE-EA21-4633-A181-CD35196DF06E", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "7D6BF5B1-86D1-47FE-9D9C-735718F94874", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "84D15CE0-69DF-4EFD-801E-96A4D6AABEDB", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", matchCriteriaId: "CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", matchCriteriaId: "F2F38886-C25A-4C6B-93E7-36461405BA99", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", matchCriteriaId: "C65D2670-F37F-48CB-804A-D35BB1C27D9F", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", matchCriteriaId: "DE8E5194-7B34-4802-BDA6-6A86EB5EDE05", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", matchCriteriaId: "FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", matchCriteriaId: "2917BD67-CE81-4B94-B241-D4A9DDA60319", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", matchCriteriaId: "A524A94E-F19B-42B9-AA8E-171751C339AA", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", matchCriteriaId: "F71436CF-F756-44E0-8E69-6951F6B3E54A", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", matchCriteriaId: "582EE839-B83F-4908-9780-D0C92DC44FD0", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", matchCriteriaId: "824369CF-00A0-434E-94BC-71CA1317012C", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", matchCriteriaId: "BCB35099-B04E-4796-A25D-953329FE62F3", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", matchCriteriaId: "5DBEBCFD-80D6-466A-BAEF-C75E65A3B12E", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", matchCriteriaId: "C30ACBCA-4FA1-46DE-8F15-4830BC27E160", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", matchCriteriaId: "9453EF65-7C69-449E-BF7C-4FECFB56713E", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", matchCriteriaId: "4AA75825-21CF-475B-8040-126A13FA2216", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", matchCriteriaId: "CA97C80E-17FA-4866-86CE-29886145ED80", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", matchCriteriaId: "7DE24BED-202E-416D-B5F2-8207D97B9939", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", matchCriteriaId: "04198E04-CE1D-4A5A-A20C-D1E135B45F94", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", matchCriteriaId: "717DB967-F658-4699-A224-5B261BFEC10A", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", matchCriteriaId: "3487FA64-BE04-42CA-861E-3DAC097D7D32", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "F3D956DC-C73B-439F-8D79-8239207CC76F", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", matchCriteriaId: "57E2C7E7-56C0-466C-BB08-5EB43922C4F9", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", matchCriteriaId: "462E135A-5616-46CC-A9C0-5A7A0526ACC6", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", matchCriteriaId: "6121F9C1-F4DF-4AAB-9E51-AC1592AA5639", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", matchCriteriaId: "58D44634-A0B5-4F05-8983-B08D392EC742", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", matchCriteriaId: "EB3AC3D3-FDD7-489F-BDCF-BDB55DF33A8B", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", matchCriteriaId: "4105171B-9C90-4ABF-B220-A35E7BA9EE40", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", matchCriteriaId: "20985549-DB24-4B69-9D40-208A47AE658E", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", matchCriteriaId: "43A13026-416F-4308-8A1B-E989BD769E12", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", matchCriteriaId: "612B015E-9F96-4CE6-83E4-23848FD609E5", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", matchCriteriaId: "1E391619-0967-43E1-8CBC-4D54F72A85C2", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", matchCriteriaId: "412DF091-7604-4110-87A0-3488116A97E5", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "FBC3CAD3-2F54-4E32-A0C9-0D826C45AC23", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", matchCriteriaId: "76CD3BDF-A079-4EF3-ABDE-43CBDD08DB1F", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*", matchCriteriaId: "54186D4A-C6F0-44AD-94FB-73B4346ABB6B", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*", matchCriteriaId: "47E50AD9-BA35-4817-BD4D-5D678FC5A3C5", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*", matchCriteriaId: "DD09DE40-8C9B-41EA-B372-9E4E4830E8F4", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*", matchCriteriaId: "F223FB83-0EDB-4429-94B9-1AEEF314B73F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The nsObserverList::FillObserverArray function in xpcom/ds/nsObserverList.cpp in Mozilla Firefox before 3.5.7 allows remote attackers to cause a denial of service (application crash) via a crafted web site that triggers memory consumption and an accompanying Low Memory alert dialog, and also triggers attempted removal of an observer from an empty observers array.", }, { lang: "es", value: "La función nsObserverList::FillObserverArray en xpcom/ds/nsObserverList.cpp en Mozilla Firefox anterior a v3.5.7 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un sitio web manipulado que provoca consumo de memoria y un dialogo de alerta de memoria baja, y también provoca un intento de borrado de un observador desde una matriz de observadores vacío.", }, ], id: "CVE-2010-0220", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2010-01-07T19:30:00.403", references: [ { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://hg.mozilla.org/mozilla-central/rev/51396f6c9f20", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://isc.sans.org/diary.html?storyid=7897", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:000", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.mozilla.com/en-US/firefox/3.5.7/releasenotes/", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=507114", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55550", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8292", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://hg.mozilla.org/mozilla-central/rev/51396f6c9f20", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://isc.sans.org/diary.html?storyid=7897", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.mozilla.com/en-US/firefox/3.5.7/releasenotes/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=507114", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55550", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8292", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.