Lucene search

K
mozillaMozilla FoundationMFSA2006-69
HistoryDec 19, 2006 - 12:00 a.m.

CSS cursor image buffer overflow (Windows only) — Mozilla

2006-12-1900:00:00
Mozilla Foundation
www.mozilla.org
51

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.237

Percentile

96.6%

Frederik Reiss reported a crash when using the CSS cursor property to set the cursor to certain images on Windows. A miscalculated size during conversion of the image to a Windows bitmap can result in a heap buffer overflow which could be used to compromise the victim’s computer.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.9
OR
mozillafirefoxRange<2.0.0.1
OR
mozillaseamonkeyRange<1.0.7
OR
mozillathunderbirdRange<1.5.0.9
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.237

Percentile

96.6%