Data corruption with SOCKS5 reply containing DNS name longer than 15 characters

Related Vulnerabilities: CVE-2009-2470  

Mozilla Foundation Security Advisory 2009-38

Data corruption with SOCKS5 reply containing DNS name longer than 15 characters

Announced
July 21, 2009
Reporter
Andrej Andolsek
Impact
Low
Products
Firefox
Fixed in
  • Firefox 3.0.12
  • Firefox 3.5.2

Description

Andrej Andolsek reported that when Firefox receives a reply from a SOCKS5 proxy which contains a DNS name longer than 15 characters, the subsequent data stream in the response can become corrupted. There was no evidence of memory corruption, however, and the severity of the issue was determined to be low.

References