Description
Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka "Path Abuse in Cookies."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1300-1 | New iceape packages fix several vulnerabilities |
Debian DSA |
DSA-1306-1 | New xulrunner packages fix several vulnerabilities |
Debian DSA |
DSA-1308-1 | New iceweasel packages fix several vulnerabilities |
Ubuntu USN |
USN-468-1 | Firefox vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:50:35.196Z
Reserved: 2007-03-08T00:00:00.000Z
Link: CVE-2007-1362
No data.
Status : Modified
Published: 2007-06-01T00:30:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-1362
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN