5
CVSSv2

CVE-2005-4134

Published: 09/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon prior to 0.9.12 allows remote malicious users to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.

Vulnerable Product Search on Vulmon Subscribe to Product

netscape navigator 7.2

k-meleon project k-meleon

k-meleon project k-meleon 0.7

k-meleon project k-meleon 0.7_service_pack_1

mozilla firefox

mozilla mozilla suite

k-meleon project k-meleon 0.8

k-meleon project k-meleon 0.8.1

netscape navigator

k-meleon project k-meleon 0.8.2

netscape navigator 7.1

Vendor Advisories

Web pages with extremely long titles caused subsequent launches of Mozilla browser to hang for up to a few minutes, or caused Mozilla to crash on computers with insufficient memory (CVE-2005-4134) ...
Web pages with extremely long titles caused subsequent launches of Firefox browser to hang for up to a few minutes, or caused Firefox to crash on computers with insufficient memory (CVE-2005-4134) ...
Mozilla Foundation Security Advisory 2006-03 Long document title causes startup denial of service Announced February 1, 2006 Reporter ZIPLOCK Impact Low Products Firefox, Mozilla Suite, SeaMonkey Fixed in ...

Exploits

source: wwwsecurityfocuscom/bid/15773/info Mozilla Firefox is reportedly prone to a remote denial-of-service vulnerability This issue presents itself when the browser handles a large entry in the 'historydat' file An attacker may trigger this issue by enticing a user to visit a malicious website and by supplying excessive data to be s ...

References

NVD-CWE-Otherhttp://www.mozilla.org/security/history-title.htmlhttp://secunia.com/advisories/17934http://www.networksecurity.fi/advisories/netscape-history.htmlhttp://www.osvdb.org/21533http://secunia.com/advisories/17944http://secunia.com/advisories/17946http://www.securityfocus.com/bid/15773http://securitytracker.com/id?1015328http://www.mozilla.org/security/announce/mfsa2006-03.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0199.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0200.htmlhttp://www.securityfocus.com/bid/16476http://secunia.com/advisories/18700http://secunia.com/advisories/18704http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.htmlhttp://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.htmlhttp://secunia.com/advisories/18708http://secunia.com/advisories/18709http://secunia.com/advisories/18705http://secunia.com/advisories/18706ftp://patches.sgi.com/support/free/security/advisories/20060201-01-Uhttp://secunia.com/advisories/19230http://www.debian.org/security/2006/dsa-1044http://www.gentoo.org/security/en/glsa/glsa-200604-12.xmlhttp://secunia.com/advisories/19759http://www.debian.org/security/2006/dsa-1046http://www.gentoo.org/security/en/glsa/glsa-200604-18.xmlhttp://secunia.com/advisories/19852http://secunia.com/advisories/19862http://secunia.com/advisories/19863http://secunia.com/advisories/19902http://www.debian.org/security/2006/dsa-1051http://secunia.com/advisories/19941http://secunia.com/advisories/19746ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txthttp://secunia.com/advisories/21033http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1http://secunia.com/advisories/21622http://support.avaya.com/elmodocs2/security/ASA-2006-205.htmhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:036http://www.mandriva.com/security/advisories?name=MDKSA-2006:037http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1http://www.vupen.com/english/advisories/2006/3391http://www.vupen.com/english/advisories/2005/2805http://www.vupen.com/english/advisories/2006/0413http://marc.info/?l=full-disclosure&m=113404911919629&w=2http://marc.info/?l=full-disclosure&m=113405896025702&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1619https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11382https://usn.ubuntu.com/275-1/https://usn.ubuntu.com/271-1/http://www.securityfocus.com/archive/1/438730/100/0/threadedhttp://www.securityfocus.com/archive/1/425978/100/0/threadedhttp://www.securityfocus.com/archive/1/425975/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/275-1/https://www.exploit-db.com/exploits/26762/