Lucene search

K
mozillaMozilla FoundationMFSA2006-38
HistoryJun 01, 2006 - 12:00 a.m.

Buffer overflow in crypto.signText() — Mozilla

2006-06-0100:00:00
Mozilla Foundation
www.mozilla.org
17

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.419

Percentile

97.3%

Mikolaj Habryn discovered an array index bug in crypto.signText() that results in overflowing an allocated array of pointers by two when optional Certificate Authority name arguments are passed in.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.4
OR
mozillaseamonkeyRange<1.0.2
OR
mozillathunderbirdRange<1.5.0.4
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.419

Percentile

97.3%