Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp per Mozilla 1.7.3 e versioni precedenti consente agli aggressori remoti di causare un denial of service (applicazione arresto) tramite un URL NNTP (news 🙂 con un carattere finale ‘\’ (backslash), che impedisce una stringa da essere NULL terminato. |
http://www.securityfocus.com/bid/12131 http://marc.info/?l=bugtraq&m=110436284718949&w=2 http://www.mozilla.org/security/announce/mfsa2005-06.html http://marc.info/?l=bugtraq&m=110780717916478&w=2 http://isec.pl/vulnerabilities/isec-0020-mozilla.txt https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100052 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9808 http://www.redhat.com/support/errata/RHSA-2005-038.html http://secunia.com/advisories/19823 http://www.novell.com/linux/security/advisories/2006_04_25.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18711 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1316 |
Vulnerabilità: CVE-2004-1316
