Heap-based buffer overflow in the UTF8ToNewUnicode function for Firefox before 1.0.1 and Mozilla before 1.7.6 might allow remote attackers to cause a denial of service (crash) or execute arbitrary code via invalid sequences in a UTF8 encoded string that result in a zero length value.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/12659 | vdb entry |
http://secunia.com/advisories/19823 | third party advisory |
http://www.mozilla.org/security/announce/mfsa2005-15.html | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=241440 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100043 | vdb entry signature |
http://www.redhat.com/support/errata/RHSA-2005-176.html | vendor advisory |
http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml | vendor advisory |
http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml | vendor advisory |
http://www.novell.com/linux/security/advisories/2006_04_25.html | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10606 | vdb entry signature |