Lucene search

K
mozillaMozilla FoundationMFSA2007-14
HistoryMay 30, 2007 - 12:00 a.m.

Path Abuse in Cookies — Mozilla

2007-05-3000:00:00
Mozilla Foundation
www.mozilla.org
19

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.284

Percentile

96.9%

Nicolas Derouet reported two problems with cookie handling in Mozilla clients. The first was that the cookie path parameter was not subject to any length checks, and this could be abused to cause the victim’s browser to use excessive amounts of memory while it was running as well as waste the disk space used to store the cookie until it expired. Cookies sent by an HTTP server are limited to a reasonable size by the general limit on the size of an HTTP header, but cookies created programmatically through JavaScript and added using document.cookie could have a path of any length the script could create – potentially several tens of megabytes.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.12
OR
mozillafirefoxRange<2.0.0.4
OR
mozillaseamonkeyRange<1.0.9
OR
mozillaseamonkeyRange<1.1.2
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.284

Percentile

96.9%