CVE-2005-2701

Heap-based buffer overflow in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.
References
Link Resource
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
http://secunia.com/advisories/16911
http://secunia.com/advisories/16917
http://secunia.com/advisories/16977
http://secunia.com/advisories/17014
http://secunia.com/advisories/17026
http://secunia.com/advisories/17149
http://secunia.com/advisories/17263
http://secunia.com/advisories/17284
http://securitytracker.com/id?1014954
http://www.debian.org/security/2005/dsa-838
http://www.debian.org/security/2005/dsa-866
http://www.debian.org/security/2005/dsa-868
http://www.mandriva.com/security/advisories?name=MDKSA-2005:169
http://www.mandriva.com/security/advisories?name=MDKSA-2005:170
http://www.mandriva.com/security/advisories?name=MDKSA-2005:174
http://www.mozilla.org/security/announce/mfsa2005-58.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_58_mozilla.html
http://www.osvdb.org/19643
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html
http://www.redhat.com/support/errata/RHSA-2005-785.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-789.html
http://www.securityfocus.com/bid/14916
http://www.securityfocus.com/bid/15495
http://www.ubuntu.com/usn/usn-200-1
http://www.vupen.com/english/advisories/2005/1824
https://exchange.xforce.ibmcloud.com/vulnerabilities/22373
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1480
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9323
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
http://secunia.com/advisories/16911
http://secunia.com/advisories/16917
http://secunia.com/advisories/16977
http://secunia.com/advisories/17014
http://secunia.com/advisories/17026
http://secunia.com/advisories/17149
http://secunia.com/advisories/17263
http://secunia.com/advisories/17284
http://securitytracker.com/id?1014954
http://www.debian.org/security/2005/dsa-838
http://www.debian.org/security/2005/dsa-866
http://www.debian.org/security/2005/dsa-868
http://www.mandriva.com/security/advisories?name=MDKSA-2005:169
http://www.mandriva.com/security/advisories?name=MDKSA-2005:170
http://www.mandriva.com/security/advisories?name=MDKSA-2005:174
http://www.mozilla.org/security/announce/mfsa2005-58.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_58_mozilla.html
http://www.osvdb.org/19643
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html
http://www.redhat.com/support/errata/RHSA-2005-785.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-789.html
http://www.securityfocus.com/bid/14916
http://www.securityfocus.com/bid/15495
http://www.ubuntu.com/usn/usn-200-1
http://www.vupen.com/english/advisories/2005/1824
https://exchange.xforce.ibmcloud.com/vulnerabilities/22373
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1480
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9323
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla_suite:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla_suite:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla_suite:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla_suite:1.7.10:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt - () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt -
References () http://secunia.com/advisories/16911 - () http://secunia.com/advisories/16911 -
References () http://secunia.com/advisories/16917 - () http://secunia.com/advisories/16917 -
References () http://secunia.com/advisories/16977 - () http://secunia.com/advisories/16977 -
References () http://secunia.com/advisories/17014 - () http://secunia.com/advisories/17014 -
References () http://secunia.com/advisories/17026 - () http://secunia.com/advisories/17026 -
References () http://secunia.com/advisories/17149 - () http://secunia.com/advisories/17149 -
References () http://secunia.com/advisories/17263 - () http://secunia.com/advisories/17263 -
References () http://secunia.com/advisories/17284 - () http://secunia.com/advisories/17284 -
References () http://securitytracker.com/id?1014954 - () http://securitytracker.com/id?1014954 -
References () http://www.debian.org/security/2005/dsa-838 - () http://www.debian.org/security/2005/dsa-838 -
References () http://www.debian.org/security/2005/dsa-866 - () http://www.debian.org/security/2005/dsa-866 -
References () http://www.debian.org/security/2005/dsa-868 - () http://www.debian.org/security/2005/dsa-868 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:169 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:169 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:170 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:170 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:174 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:174 -
References () http://www.mozilla.org/security/announce/mfsa2005-58.html - Vendor Advisory () http://www.mozilla.org/security/announce/mfsa2005-58.html - Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2005_58_mozilla.html - () http://www.novell.com/linux/security/advisories/2005_58_mozilla.html -
References () http://www.osvdb.org/19643 - () http://www.osvdb.org/19643 -
References () http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html - () http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html -
References () http://www.redhat.com/support/errata/RHSA-2005-785.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-785.html - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-789.html - () http://www.redhat.com/support/errata/RHSA-2005-789.html -
References () http://www.securityfocus.com/bid/14916 - () http://www.securityfocus.com/bid/14916 -
References () http://www.securityfocus.com/bid/15495 - () http://www.securityfocus.com/bid/15495 -
References () http://www.ubuntu.com/usn/usn-200-1 - () http://www.ubuntu.com/usn/usn-200-1 -
References () http://www.vupen.com/english/advisories/2005/1824 - () http://www.vupen.com/english/advisories/2005/1824 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22373 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22373 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1480 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1480 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9323 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9323 -

Information

Published : 2005-09-23 19:03

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2701

Mitre link : CVE-2005-2701

CVE.ORG link : CVE-2005-2701


JSON object : View

Products Affected

mozilla

  • firefox
  • mozilla_suite