Mozilla POP3 Mail Handler Remote Overflow (deprecated)

high Nessus Network Monitor Plugin ID 1320

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running a version of the Mozilla browser that may contain a buffer overflow vulnerability. An integer overflow vulnerability has been reported for the Netscape/Mozilla POP3 mail handler routines. Reportedly, insufficient checks are performed on some server supplied values. An attacker may exploit this vulnerability through an attacker-controlled POP3 server. By issuing a very large integer value that is used by the Netscape/Mozilla POP3 mail handler, it may be possible to cause an integer overflow condition and allocate a buffer that is too small. Successful exploitation of this vulnerability may allow an attacker to obtain control over the execution of the vulnerable Mozilla process.

Solution

Upgrade to the latest version of Mozilla.

Plugin Details

Severity: High

ID: 1320

Family: SMTP Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:mozilla_mail

Reference Information

BID: 6254