Lucene search

K
mozillaMozilla FoundationMFSA2010-29
HistoryJun 22, 2010 - 12:00 a.m.

Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal — Mozilla

2010-06-2200:00:00
Mozilla Foundation
www.mozilla.org
35

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.13

Percentile

95.6%

Security researcher Nils of MWR InfoSecurity reported that the routine for setting the text value for certain types of DOM nodes contained an integer overflow vulnerability. When a very long string was passed to this routine, the integer value used in creating a new memory buffer to hold the string would overflow, resulting in too small a buffer being allocated. An attacker could use this vulnerability to write data past the end of the buffer, causing a crash and potentially running arbitrary code on a victim’s computer.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.10
OR
mozillafirefoxRange<3.6.4
OR
mozillaseamonkeyRange<2.0.5
OR
mozillathunderbirdRange<3.0.5
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.13

Percentile

95.6%