Lucene search

K
mozillaMozilla FoundationMFSA2010-30
HistoryJun 22, 2010 - 12:00 a.m.

Integer Overflow in XSLT Node Sorting — Mozilla

2010-06-2200:00:00
Mozilla Foundation
www.mozilla.org
30

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.793

Percentile

98.3%

Security researcher Martin Barbella reported via TippingPoint’s Zero Day Initiative that an XSLT node sorting routine contained an integer overflow vulnerability. In cases where one of the nodes to be sorted contained a very large text value, the integer used to allocate a memory buffer to store its value would overflow, resulting in too small a buffer being created. An attacker could use this vulnerability to write data past the end of the buffer, causing the browser to crash and potentially running arbitrary code on a victim’s computer.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.10
OR
mozillafirefoxRange<3.6.4
OR
mozillaseamonkeyRange<2.0.5
OR
mozillathunderbirdRange<3.0.5

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.793

Percentile

98.3%