Mozilla SOAPParameter Object Constructor Overlow

high Nessus Plugin ID 14192


The remote Windows host contains a web browser that is affected by an integer overflow vulnerability.


The Mozilla web browser is installed on the remote host.

The remote version of this software has an integer overflow vulnerability in the SOAPParameter object constructor. This could result in arbitrary code execution.

A remote attacker could exploit this flaw by tricking a user into viewing a maliciously crafted web page.


Upgrade to Mozilla 1.7.1 or later.

Plugin Details

Severity: High

ID: 14192

File Name: mozilla_soapparameter_overflow.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 8/2/2004

Updated: 7/16/2018

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:mozilla

Required KB Items: Mozilla/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/2/2004

Vulnerability Publication Date: 8/2/2004

Reference Information

CVE: CVE-2004-0722

BID: 10843