Rapid7 Vulnerability & Exploit Database

MFSA2008-49 SeaMonkey: Arbitrary code execution via Flash Player dynamic module unloading (CVE-2008-5013)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

MFSA2008-49 SeaMonkey: Arbitrary code execution via Flash Player dynamic module unloading (CVE-2008-5013)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
11/13/2008
Created
07/25/2018
Added
02/03/2012
Modified
02/13/2015

Description

Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.

Solution(s)

  • mozilla-seamonkey-upgrade-1_1_13

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;