SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Browser Vendors:   Mozilla.org
Mozilla Suite Buffer Overflow in Netscape Extension GIF Processing Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1013519
SecurityTracker URL:  http://securitytracker.com/id/1013519
CVE Reference:   CVE-2005-0399   (Links to External Site)
Date:  Mar 23 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.7.6
Description:   A vulnerability was reported in the Mozilla Suite in the processing of GIF images. A remote user can execute arbitrary code on the target system.

There is a GIF processing error in the parsing of the obsolete Netscape extension 2. A remote user can create a specially crafted image that, when viewed by the target user, will trigger a buffer overflow and execute arbitrary code.

Mark Dowd of ISS X-Force discovered this vulnerability.

Impact:   A remote user can create an image that, when viewed by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.
Solution:   The vendor has issued a fixed version (1.7.6), available at:

http://www.mozilla.org/products/mozilla1.x/

Vendor URL:  www.mozilla.org/security/announce/mfsa2005-30.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC