String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird prior to 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote malicious users to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla thunderbird 0.1 |
||
mozilla thunderbird 0.2 |
||
mozilla firefox 1.0 |
||
mozilla mozilla 1.7.3 |
||
mozilla thunderbird 0.7 |
||
mozilla thunderbird 0.8 |
||
mozilla thunderbird 0.3 |
||
mozilla thunderbird 0.4 |
||
mozilla thunderbird 0.9 |
||
mozilla thunderbird 1.0 |
||
mozilla thunderbird 0.5 |
||
mozilla thunderbird 0.6 |