Lucene search

K
mozillaMozilla FoundationMFSA2009-59
HistoryOct 27, 2009 - 12:00 a.m.

Heap buffer overflow in string to number conversion — Mozilla

2009-10-2700:00:00
Mozilla Foundation
www.mozilla.org
13

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.97 High

EPSS

Percentile

99.7%

Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla’s string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper memory allocation and the execution of an arbitrary memory location. This vulnerability could thus be leveraged by the attacker to run arbitrary code on a victim’s computer.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.15
OR
mozillafirefoxRange<3.5.4
CPENameOperatorVersion
firefoxlt3.0.15
firefoxlt3.5.4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.97 High

EPSS

Percentile

99.7%