|
|
|
|
| |
Credit:
The information has been provided by zdi disclosures.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-06-010.html
The vendor advisory can be found at: http://www.mozilla.org/security/announce/2006/mfsa2006-22.html
|
| |
Vulnerable Systems:
* Firefox version 1.5 and above
* Firefox version 1.5.0.1 and prior
* Firefox version 1.0 and above 1.0.7
* Firefox version 1.0 and above
* Firefox version 1.0.7 and prior
* Thunderbird version 1.5 and above
* Thunderbird version 1.5.0.1
* Thunderbird version 1.0 and above
* Thunderbird version 1.0.7 and prior
* SeaMonkey version 1.0
* Mozilla Suite version 1.7 and above
* Mozilla Suite version 1.7.12 and prior
The specific flaw is due to incorrect handling of the CSS "letter-spacing" element. By specifying a large number, an attacker can overflow an integer used during memory allocation. The under-allocated buffer is later used to store user-supplied data leading to an exploitable heap overflow.
The overflow condition itself does not require JavaScript and thus could affect Thunderbird via received mail, but without scripting to prepare memory it may not be possible to exploit this condition in mail.
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Mozilla/Firefox web browser. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.
CVE Information:
CVE-2006-1730
Disclosure Timeline:
2006.01.31 - Vulnerability reported to vendor
2006.01.31 - Digital Vaccine released to TippingPoint customers
2006.04.13 - Coordinated public release of advisory
|
|
|
|
|