CVE-2005-2871

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.

References

http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0316.html

http://marc.info/?l=full-disclosure&m=112624614008387&w=2

http://secunia.com/advisories/16764

http://secunia.com/advisories/16766

http://secunia.com/advisories/16767

http://secunia.com/advisories/17042

http://secunia.com/advisories/17090

http://secunia.com/advisories/17263

http://secunia.com/advisories/17284

http://securityreason.com/securityalert/83

http://securitytracker.com/id?1014877

http://www.ciac.org/ciac/bulletins/p-303.shtml

http://www.debian.org/security/2005/dsa-837

http://www.debian.org/security/2005/dsa-866

http://www.debian.org/security/2005/dsa-868

http://www.gentoo.org/security/en/glsa/glsa-200509-11.xml

http://www.kb.cert.org/vuls/id/573857

http://www.mandriva.com/security/advisories?name=MDKSA-2005:174

http://www.mozilla.org/security/announce/mfsa2005-57.html

http://www.osvdb.org/19255

http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html

http://www.redhat.com/support/errata/RHSA-2005-768.html

http://www.redhat.com/support/errata/RHSA-2005-769.html

http://www.redhat.com/support/errata/RHSA-2005-791.html

http://www.securiteam.com/securitynews/5RP0B0UGVW.html

http://www.securityfocus.com/bid/14784

http://www.security-protocols.com/advisory/sp-x17-advisory.txt

http://www.security-protocols.com/firefox-death.html

http://www.ubuntu.com/usn/usn-181-1

http://www.vupen.com/english/advisories/2005/1690

http://www.vupen.com/english/advisories/2005/1691

http://www.vupen.com/english/advisories/2005/1824

https://bugzilla.mozilla.org/show_bug.cgi?id=307259

https://exchange.xforce.ibmcloud.com/vulnerabilities/22207

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1287

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A584

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9608

Details

Source: MITRE

Published: 2005-09-09

Updated: 2018-05-03

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (27 total)

IDNameProductFamilySeverity
21964CentOS 4 : thunderbird (CESA-2005:791)NessusCentOS Local Security Checks
high
21962CentOS 4 : firefox (CESA-2005:768)NessusCentOS Local Security Checks
high
21856CentOS 3 / 4 : mozilla (CESA-2005:769)NessusCentOS Local Security Checks
high
21463FreeBSD : firefox & mozilla -- buffer overflow vulnerability (8665ebb9-2237-11da-978e-0001020eed82)NessusFreeBSD Local Security Checks
high
20592Ubuntu 4.10 / 5.04 : mozilla, mozilla-thunderbird, mozilla-firefox vulnerabilities (USN-181-1)NessusUbuntu Local Security Checks
high
20428Mandrake Linux Security Advisory : mozilla-thunderbird (MDKSA-2005:174)NessusMandriva Local Security Checks
high
20425MDKSA-2005:169 : mozilla-firefoxNessusMandriva Local Security Checks
high
20071Debian DSA-868-1 : mozilla-thunderbird - several vulnerabilitiesNessusDebian Local Security Checks
high
20063Debian DSA-866-1 : mozilla - several vulnerabilitiesNessusDebian Local Security Checks
high
19995RHEL 4 : thunderbird (RHSA-2005:791)NessusRed Hat Local Security Checks
high
19923Mandrake Linux Security Advisory : mozilla (MDKSA-2005:170)NessusMandriva Local Security Checks
high
19884Fedora Core 4 : thunderbird-1.0.7-1.1.fc4 (2005-963)NessusFedora Local Security Checks
high
19883Fedora Core 3 : thunderbird-1.0.7-1.1.fc3 (2005-962)NessusFedora Local Security Checks
high
19810GLSA-200509-11 : Mozilla Suite, Mozilla Firefox: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
19806Debian DSA-837-1 : mozilla-firefox - buffer overflowNessusDebian Local Security Checks
high
3239Mozilla Firefox < 1.0.7 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
3238Mozilla Firefox < 1.7.12 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
19736Fedora Core 3 : mozilla-1.7.10-1.3.2 (2005-874)NessusFedora Local Security Checks
high
19735Fedora Core 4 : mozilla-1.7.10-1.5.2 (2005-873)NessusFedora Local Security Checks
high
19734Fedora Core 3 : firefox-1.0.6-1.2.fc3 (2005-872)NessusFedora Local Security Checks
high
19733Fedora Core 4 : firefox-1.0.6-1.2.fc4 (2005-871)NessusFedora Local Security Checks
high
19719Firefox < 1.0.7 Multiple VulnerabilitiesNessusWindows
high
19694Mozilla Thunderbird < 1.0.7 IDN URL Domain Name Overflow NessusWindows
high
19677RHEL 2.1 / 3 / 4 : mozilla (RHSA-2005:769)NessusRed Hat Local Security Checks
high
19676RHEL 4 : firefox (RHSA-2005:768)NessusRed Hat Local Security Checks
high
801294Mozilla Browser < 1.7.12 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
800781Firefox < 1.0.7 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high