Mozilla POP3 Mail Handler Remote Overflow (deprecated)

High Nessus Network Monitor Plugin ID 1320

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running a version of the Mozilla browser that may contain a buffer overflow vulnerability. An integer overflow vulnerability has been reported for the Netscape/Mozilla POP3 mail handler routines. Reportedly, insufficient checks are performed on some server supplied values. An attacker may exploit this vulnerability through an attacker-controlled POP3 server. By issuing a very large integer value that is used by the Netscape/Mozilla POP3 mail handler, it may be possible to cause an integer overflow condition and allocate a buffer that is too small. Successful exploitation of this vulnerability may allow an attacker to obtain control over the execution of the vulnerable Mozilla process.

Solution

Upgrade to the latest version of Mozilla.

Plugin Details

Severity: High

ID: 1320

Family: SMTP Clients

Published: 2004/08/20

Modified: 2016/01/19

Dependencies: 1330

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 7.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:C

CVSSv3

Base Score: 8.1

Temporal Score: 7.4

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:U/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:mozilla_mail

Reference Information

BID: 6254