HTTP: Mozilla Firefox Tag Order Memory Corruption
This signature detects attempts to exploit a known vulnerability in the Mozilla Firefox. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Extended Description
The Mozilla Foundation has released nine security advisories specifying security vulnerabilities in Mozilla Suite, Firefox, SeaMonkey, and Thunderbird. These vulnerabilities allow attackers to: - execute arbitrary machine code in the context of the vulnerable application - crash affected applications - gain elevated privileges in JavaScript code, potentially allowing remote machine code execution - gain access to potentially sensitive information - bypass security checks - spoof window contents. Other attacks may also be possible. The issues described here will be split into individual BIDs as the information embargo on the Mozilla Bugzilla entries is lifted and as further information becomes available. This BID will then be retired. These issues are fixed in: - Mozilla Firefox versions 1.0.8 and 1.5.0.2 - Mozilla Thunderbird versions 1.0.8 and 1.5.0.2 - Mozilla Suite version 1.7.13 - Mozilla SeaMonkey version 1.0.1
Affected Products
Mozilla thunderbird
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Sco
Suse
Gentoo
Sun
Hp
Mozilla
Debian
Slackware
Ubuntu
Mandriva
Netscape
9.3