Mozilla Firefox Buffer Overflow in Processing Hostnames May Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1014877 |
SecurityTracker URL: http://securitytracker.com/id/1014877
|
CVE Reference:
CVE-2005-2871
(Links to External Site)
|
Updated: Jun 8 2008
|
Original Entry Date: Sep 9 2005
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes
|
Version(s): 1.5 Beta 1, 1.0.6, and prior versions
|
Description:
A vulnerability was reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create HTML that contains a link to a hostname composed of dash ('-') characters. When the HTML is loaded, a buffer overflow may be triggered and arbitrary code may be executed on the target user's system.
The flaw resides in the IDN support implementation.
A demonstration exploit tag is provided:
<A HREF=https:--------------------------------------------- >
A demonstration exploit is available at:
www.security-protocols.com/firefox-death.html
The vendor was notified on September 4, 2005.
Netscape 7.2 and 8.0.3.3 are also affected.
Tom Ferris of security-protocols.com discovered this vulnerability.
|
Impact:
A remote user may be able to cause arbitrary code to be executed on the target user's system.
|
Solution:
The vendor has issued a fixed version (1.0.7), available at:
http://www.mozilla.org/products/firefox/
The vendor previously issued a patch to disable the vulnerable IDN support code within the browser. The patch is available at:
http://www.mozilla.org/security/idn.html
As an alternative to the patch, the vendor has described a manual method to disable IDN support.
Red Hat has issued a fix for Red Hat Enterprise Linux 4:
https://rhn.redhat.com/errata/RHSA-2005-768.html
Red Hat has issued a fix the Mozilla Browser for Red Hat Enterprise Linux 2, 3, and 4:
https://rhn.redhat.com/errata/RHSA-2005-769.html
|
Vendor URL: www.mozilla.org/security/idn.html (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|