7.5
CVSSv2

CVE-2005-2701

Published: 23/09/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in Firefox prior to 1.0.7 and Mozilla Suite prior to 1.7.12 allows remote malicious users to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 1.0.5

mozilla firefox 1.0.3

mozilla firefox 1.0.4

mozilla firefox 1.0

mozilla mozilla suite 1.7.7

mozilla mozilla suite 1.7.8

mozilla firefox 1.0.1

mozilla firefox 1.0.2

mozilla firefox

mozilla mozilla suite

mozilla mozilla suite 1.7.10

mozilla mozilla suite 1.7.6

Vendor Advisories

A buffer overflow was discovered in the XBM image handler By tricking an user into opening a specially crafted XBM image, an attacker could exploit this to execute arbitrary code with the user’s privileges (CAN-2005-2701) ...
Synopsis firefox security update Type/Severity Security Advisory: Critical Topic An updated firefox package that fixes several security bugs is nowavailable for Red Hat Enterprise Linux 4This update has been rated as having critical security impact by the RedHat Security Response Team Description ...
Synopsis mozilla security update Type/Severity Security Advisory: Critical Topic Updated mozilla packages that fix several security bugs are now availableThis update has been rated as having critical security impact by the RedHat Security Response Team Description Mozilla is an open sourc ...
Several security-related problems have been discovered in Mozilla and derived programs Some of the following problems don't exactly apply to Mozilla Thunderbird, even though the code is present In order to keep the codebase in sync with upstream it has been altered nevertheless The Common Vulnerabilities and Exposures project identifies the foll ...
Several security-related problems have been discovered in Mozilla and derived programs The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2005-2871 Tom Ferris discovered a bug in the IDN hostname handling of Mozilla that allows remote attackers to cause a denial of service and possibly execute arbi ...
Multiple security vulnerabilities have been identified in the mozilla-firefox web browser These vulnerabilities could allow an attacker to execute code on the victim's machine via specially crafted network resources CAN-2005-2701 Heap overrun in XBM image processing CAN-2005-2702 Denial of service (crash) and possible execution of arbitrary c ...

References

NVD-CWE-Otherhttp://www.mozilla.org/security/announce/mfsa2005-58.htmlhttp://www.redhat.com/support/errata/RHSA-2005-785.htmlhttp://securitytracker.com/id?1014954http://www.mandriva.com/security/advisories?name=MDKSA-2005:169http://www.mandriva.com/security/advisories?name=MDKSA-2005:170http://www.mandriva.com/security/advisories?name=MDKSA-2005:174http://www.ubuntu.com/usn/usn-200-1http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.htmlhttp://www.redhat.com/support/errata/RHSA-2005-789.htmlhttp://www.securityfocus.com/bid/14916http://www.osvdb.org/19643http://secunia.com/advisories/16911http://secunia.com/advisories/16917http://www.debian.org/security/2005/dsa-868ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txthttp://www.securityfocus.com/bid/15495http://secunia.com/advisories/17149http://secunia.com/advisories/17284http://www.debian.org/security/2005/dsa-838http://www.debian.org/security/2005/dsa-866http://secunia.com/advisories/17026http://secunia.com/advisories/17263http://www.novell.com/linux/security/advisories/2005_58_mozilla.htmlhttp://secunia.com/advisories/16977http://secunia.com/advisories/17014http://www.vupen.com/english/advisories/2005/1824https://exchange.xforce.ibmcloud.com/vulnerabilities/22373https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9323https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1480https://usn.ubuntu.com/200-1/https://nvd.nist.gov