The XML parser in Mozilla Firefox before 1.5.0.1 and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly read sensitive data via unknown attack vectors that trigger an out-of-bounds read.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A677 | signature vdb entry |
http://secunia.com/advisories/18704 | patch vendor advisory third party advisory |
http://www.vupen.com/english/advisories/2006/3749 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/16476 | patch vdb entry exploit |
http://www.vupen.com/english/advisories/2006/0413 | vdb entry vendor advisory |
http://securitytracker.com/id?1015570 | patch vdb entry |
http://secunia.com/advisories/18700 | patch vendor advisory third party advisory |
http://www.securityfocus.com/archive/1/446657/100/200/threaded | vendor advisory |
http://secunia.com/advisories/22065 | third party advisory vendor advisory |
http://www.mozilla.org/security/announce/2006/mfsa2006-07.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24436 | vdb entry |