From 9d91c8188ee62e3fd0e59e0d5ca65da31edc30c4 Mon Sep 17 00:00:00 2001 From: Jacques Vidrine Date: Thu, 13 Jan 2005 18:03:57 +0000 Subject: [PATCH] Document Mozilla NNTP handler vulnerability. --- security/vuxml/vuln.xml | 58 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 52717ae1ceac..f4668d79a090 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,64 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + mozilla -- heap overflow in NNTP handler + + + de-netscape7 + fr-netscape7 + ja-netscape7 + netscape7 + pt_BR-netscape7 + 0 + + + mozilla-gtk1 + linux-mozilla + linux-mozilla-devel + 1.7.5 + + + mozilla + 1.7.5,2 + + + + de-linux-netscape + fr-linux-netscape + ja-linux-netscape + linux-netscape + mozilla+ipv6 + mozilla-embedded + mozilla-gtk2 + mozilla-gtk + 0 + + + + +

Maurycy Prodeus reports a critical vulnerability in + Mozilla-based browsers:

+
+

Mozilla browser supports NNTP urls. Remote side is able to + trigger news:// connection to any server. I found a flaw in + NNTP handling code which may cause heap overflow and allow + remote attacker to execute arbitrary code on client + machine.

+
+ +
+ + CAN-2004-1316 + http://isec.pl/vulnerabilities/isec-0020-mozilla.txt + http://marc.theaimsgroup.com/?l=bugtraq&m=110436284718949 + + + 2004-12-29 + 2005-01-13 + +
+ mpg123 -- buffer overflow vulnerability