Unrated severityNVD Advisory· Published Nov 13, 2008· Updated Apr 23, 2026
CVE-2008-5021
CVE-2008-5021
Description
nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.
Affected products
21- cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
- cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
- cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
38- lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.htmlnvdMailing ListThird Party Advisory
- secunia.com/advisories/32684nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32693nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32694nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32695nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32713nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32714nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32715nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32721nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32778nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32798nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32845nvdBroken LinkThird Party Advisory
- secunia.com/advisories/32853nvdBroken LinkThird Party Advisory
- secunia.com/advisories/33433nvdBroken LinkThird Party Advisory
- secunia.com/advisories/33434nvdBroken LinkThird Party Advisory
- secunia.com/advisories/34501nvdBroken LinkThird Party Advisory
- ubuntu.com/usn/usn-667-1nvdThird Party Advisory
- www.debian.org/security/2008/dsa-1669nvdMailing ListThird Party Advisory
- www.debian.org/security/2008/dsa-1671nvdMailing ListThird Party Advisory
- www.debian.org/security/2009/dsa-1696nvdMailing ListThird Party Advisory
- www.debian.org/security/2009/dsa-1697nvdMailing ListThird Party Advisory
- www.mandriva.com/security/advisoriesnvdBroken LinkThird Party Advisory
- www.mandriva.com/security/advisoriesnvdBroken LinkThird Party Advisory
- www.mandriva.com/security/advisoriesnvdBroken LinkThird Party Advisory
- www.mozilla.org/security/announce/2008/mfsa2008-55.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2008-0976.htmlnvdBroken LinkThird Party Advisory
- www.redhat.com/support/errata/RHSA-2008-0977.htmlnvdBroken LinkThird Party Advisory
- www.redhat.com/support/errata/RHSA-2008-0978.htmlnvdBroken LinkThird Party Advisory
- www.securityfocus.com/bid/32281nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- www.us-cert.gov/cas/techalerts/TA08-319A.htmlnvdThird Party AdvisoryUS Government Resource
- www.vupen.com/english/advisories/2008/3146nvdBroken LinkThird Party Advisory
- www.vupen.com/english/advisories/2009/0977nvdBroken LinkThird Party Advisory
- bugzilla.mozilla.org/show_bug.cginvdIssue TrackingVendor Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9642nvdBroken LinkThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.htmlnvdMailing ListThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.htmlnvdMailing ListThird Party Advisory
- sunsolve.sun.com/search/document.donvdBroken Link
News mentions
0No linked articles in our index yet.