The native implementations of InstallTrigger and other functions in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 do not properly verify the types of objects being accessed, which causes the Javascript interpreter to continue execution at the wrong memory address, which may allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code by passing objects of the wrong type.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T21:44:05.013Z
Reserved: 2005-04-18T00:00:00
Link: CVE-2005-1159

No data.

Status : Modified
Published: 2005-05-02T04:00:00.000
Modified: 2024-11-20T23:56:44.520
Link: CVE-2005-1159
