2107033 : Mozilla, Firefox, Thunderbird, and Netscape non-ascii character buffer overflow

High RiskHigh Risk

Quick Links

Event description Jump to the top of this document

Mozilla is vulnerable to a heap overflow, caused by improper handling of non-ascii characters in a URL. By creating a specially-crafted URL request containing non-ascii characters, a remote attacker could overflow a buffer and execute arbitrary code on the system, once the link is clicked. An attacker could exploit this vulnerability by hosting the malicious URL on a Web site or by sending it to a victim as an HTML email.

Products that have this security check Jump to the top of this document

HTTP_Mozilla_Nonascii_URL_BO

This looks for links to hostnames with nonascii characters embedded within them. These links could trigger a buffer overflow on some versions of Mozilla.

False Positive:Non-English sites may deviate from standard hostname requirements.

Affected platforms Jump to the top of this document

How to remove this vulnerability Jump to the top of this document

For Mozilla:
Upgrade to the latest version (1.7.3 or later), available from the Mozilla Web site. See References.

For Firefox:
Upgrade to the latest version (1.0PR or later), available from the Mozilla Web site. See References.

For Thunderbird:
Upgrade to the latest version (0.8 or later), available from the Mozilla Web site. See References.

For Gentoo Linux:
Upgrade to the latest version of Mozilla, Epiphany, Mozilla Thunderbird, and Mozilla Firefox, as listed in GLSA 200409-26. See References.

For Slackware Linux:
Upgrade to the latest Mozilla package, as listed below. Refer to slackware-security Mailing List, Wed, 22 Sep 2004 13:39:12 -0700 (PDT) for more information. See References.

Slackware Linux 10 and -current: 1.7.3-i486-1 or later

For HP Tru64 Unix 5.1A and 5.1B:
Apply the appropriate patch for your system, as listed in Hewlett-Packard Company Security Bulletin HPSBTU01081. See References.

For SuSE Linux:
Apply the update for this vulnerability, as listed in SuSE Security Announcement SUSE-SA:2004:036. See References.

For Conectiva Linux:
Upgrade to the latest mozilla package, as listed below. Refer to Conectiva Linux Security Announcement CLSA-2004:877 for more information. See References.

Conectiva Linux 10.0: 1.7.3-60868U10_1cl or later
Conectiva Linux 9: 1.7.3-27852U90_4cl or later

For other distributions:
Contact your vendor for upgrade or patch information.

References Jump to the top of this document

Mozilla Bugzilla Bug 256316
non-ascii char in URL lead to heap overrun
http://bugzilla.mozilla.org/show_bug.cgi?id=256316

Conectiva Linux Security Announcement CLSA-2004:877
New upstream for mozilla
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000877

slackware-security Mailing List, Wed, 22 Sep 2004 13:39:12 -0700 (PDT)
[slackware-security] Mozilla (SSA:2004-266-03)
http://slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.401801

Mozilla Web site
Mozilla - Home of the Firefox web browser, Thunderbird and the Mozilla Suite
http://www.mozilla.org/

BugTraq
Mozilla Browser Non-ASCII Hostname Heap Overflow Vulnerability
http://www.securityfocus.com/bid/11169

Common Vulnerabilities and Exposures
Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via (1) the Send page functionality, (2) certain responses from a malicious POP3 server, or (3) a link containing a non-ASCII hostname.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0902

Information about this document Jump to the top of this document

The information contained in this document may change without notice, and may have been altered or changed if you have received it from a source other than Internet Security Systems. Use of this information constitutes acceptance for use in an "AS IS" condition, without warranties of any kind, and any use of this information is at the user's own risk. Internet Security Systems disclaims all warranties, either expressed or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Internet Security Systems be liable for any damages whatsoever, including direct, indirect, incidental, consequential or special damages, arising from the use or dissemination hereof, even if Internet Security Systems has been advised of the possibility of such damages.

Copyright © 1997 – 2014 IBM Internet Security Systems. All rights reserved.

This page was created on Wed Jul 16 00:51:47 2014