Lucene search

K
mozillaMozilla FoundationMFSA2011-37
HistorySep 27, 2011 - 12:00 a.m.

Integer underflow when using JavaScript RegExp — Mozilla

2011-09-2700:00:00
Mozilla Foundation
www.mozilla.org
17

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.106 Low

EPSS

Percentile

95.1%

Mark Kaplan reported a potentially exploitable crash due to integer underflow when using a large JavaScript RegExp expression. We would also like to thank Mark for contributing the fix for this problem.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.6.23
CPENameOperatorVersion
firefoxlt3.6.23

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.106 Low

EPSS

Percentile

95.1%