Mozilla SOAPParameter Object Constructor Overlow

high Nessus Plugin ID 14192

Synopsis

The remote Windows host contains a web browser that is affected by an integer overflow vulnerability.

Description

The Mozilla web browser is installed on the remote host.

The remote version of this software has an integer overflow vulnerability in the SOAPParameter object constructor. This could result in arbitrary code execution.

A remote attacker could exploit this flaw by tricking a user into viewing a maliciously crafted web page.

Solution

Upgrade to Mozilla 1.7.1 or later.

Plugin Details

Severity: High

ID: 14192

File Name: mozilla_soapparameter_overflow.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 8/2/2004

Updated: 7/16/2018

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:mozilla

Required KB Items: Mozilla/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/2/2004

Vulnerability Publication Date: 8/2/2004

Reference Information

CVE: CVE-2004-0722

BID: 10843