CVE-2008-5500Critical
DEB
DEB
Debian Security Advisories (DSA)
DSAs are published by the Debian Security Team for issues affecting the stable distribution. The downstream tracker (security-tracker.debian.org) additionally maps every CVE to its package-level status across all supported suites.
Region
Intl.
Updates
1 ч
License
Public Domain
Advisories covering the Debian stable and oldstable releases. Ship notes include the exact .deb version that remediates each issue.
https://www.debian.org/security/ →Share link
Anyone with the link can open this vulnerability.
The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.…
CVSS
10.0
Critical
EPSS
0.06
p90
Published
2008-01-01
Updated
2008-01-01
Description
The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.
Tags · CWE
CWE-399
CWE-399CategoryDraft
Resource Management Errors
Weaknesses in this category are related to improper management of system resources.
https://cwe.mitre.org/data/definitions/399.html →Open in CWE collection →Affected products
FirefoxFirefoxFirefoxFirefox-3.0IceapeIcedoveIceweaselNsprNsprNssNssSeamonkeySeamonkeySeamonkeySeamonkeyThunderbirdThunderbirdThunderbirdXulrunnerXulrunner
CVSS vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Timeline
2008-01-01
Published
2008-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Authentication
Au: N
None (N)
Confidentiality Impact
C: C
Complete
Integrity Impact
I: C
Complete
Availability Impact
A: C
Complete
Exploit indicators
EPSS
0.062 · p90
Known exploited (KEV)
No
Known exploits — Сканер-ВС
No Сканер-ВС checks registered for this vulnerability yet.
Affected software
| Product | Vendor | Status |
|---|---|---|
| firefox | Tracked | |
| firefox | Tracked | |
| firefox | Tracked | |
| firefox-3.0 | Tracked | |
| iceape | Tracked | |
| icedove | Tracked | |
| iceweasel | Tracked | |
| nspr | Tracked | |
| nspr | Tracked | |
| nss | Tracked | |
| nss | Tracked | |
| seamonkey | Tracked | |
| seamonkey | Tracked | |
| seamonkey | Tracked | |
| seamonkey | Tracked | |
| thunderbird | Tracked | |
| thunderbird | Tracked | |
| thunderbird | Tracked | |
| xulrunner | Tracked | |
| xulrunner | Tracked |
Source databases
DEB
DEB
Debian Security Advisories (DSA)
DSAs are published by the Debian Security Team for issues affecting the stable distribution. The downstream tracker (security-tracker.debian.org) additionally maps every CVE to its package-level status across all supported suites.
Region
Intl.
Updates
1 ч
License
Public Domain
Advisories covering the Debian stable and oldstable releases. Ship notes include the exact .deb version that remediates each issue.
https://www.debian.org/security/ →CVE
CVE
National Vulnerability Database
NVD is the U.S. government repository of standards-based vulnerability management data, built on top of the MITRE CVE list. Every record includes CPE applicability statements, CVSS v2 and v3.x base scores, CWE mappings and cross-references to advisories.
Region
US
Updates
15 min
License
Public Domain
Comprehensive catalog of publicly disclosed vulnerabilities with CPE matches, CVSS scoring and reference URLs. De-facto standard for cross-vendor correlation.
https://nvd.nist.gov →RED
RED
Red Hat Security Advisories (RHSA)
Red Hat advisories are authoritative for RHEL-family systems: each record lists the exact package NEVRA fixed, the affected streams, and a Red Hat-assigned severity that may differ from NVD's. Many downstream projects (CentOS Stream, Rocky, Alma) follow these IDs.
Region
US
Updates
1 ч
License
CC BY-SA 4.0
Advisories for Red Hat Enterprise Linux, OpenShift, Ansible and other Red Hat products. Includes detailed backport tracking — critical for long-term-support distributions.
https://access.redhat.com/security/security-updates/ →UBU
UBU
Ubuntu Security Notices (USN)
USNs are authoritative for Ubuntu systems. The CVE Tracker links each vulnerability to its per-release status (needed, released, not-affected) and to the exact Launchpad bug where the fix is integrated.
Region
Intl.
Updates
1 ч
License
CC BY-SA 3.0
Security notices for Ubuntu LTS and interim releases, covering main, universe and (via Pro) ESM-extended packages.
https://ubuntu.com/security/notices →