Upstream information

CVE-2005-2871 at MITRE

Description

Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entries: 116070, 128344 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
  • MozillaFirefox >= 1.0.6-4.7
  • MozillaFirefox-translations >= 1.0.6-4.7
Builds
YOU Patch Nr: 10482
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • MozillaFirefox >= 1.0.6-4.7
  • MozillaFirefox-translations >= 1.0.6-4.7
SUSE LINUX 9.2
SUSE LINUX 9.3
  • MozillaFirefox >= 1.0.6-4.3
  • MozillaFirefox-translations >= 1.0.6-4.3