HTTP: Mozilla Firefox Tag Order Memory Corruption

This signature detects attempts to exploit a known vulnerability in the Mozilla Firefox. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Extended Description

The Mozilla Foundation has released nine security advisories specifying security vulnerabilities in Mozilla Suite, Firefox, SeaMonkey, and Thunderbird. These vulnerabilities allow attackers to: - execute arbitrary machine code in the context of the vulnerable application - crash affected applications - gain elevated privileges in JavaScript code, potentially allowing remote machine code execution - gain access to potentially sensitive information - bypass security checks - spoof window contents. Other attacks may also be possible. The issues described here will be split into individual BIDs as the information embargo on the Mozilla Bugzilla entries is lifted and as further information becomes available. This BID will then be retired. These issues are fixed in: - Mozilla Firefox versions 1.0.8 and 1.5.0.2 - Mozilla Thunderbird versions 1.0.8 and 1.5.0.2 - Mozilla Suite version 1.7.13 - Mozilla SeaMonkey version 1.0.1

Affected Products

Mozilla thunderbird

References

BugTraq: 17516

CVE: CVE-2006-0749

Short Name
HTTP:STC:MOZILLA:MOZ-TAG-ORDER
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2006-0749 Corruption Firefox Memory Mozilla Order Tag bid:17516
Release Date
09/20/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Red_hat

Sco

Suse

Gentoo

Sun

Hp

Mozilla

Debian

Slackware

Ubuntu

Mandriva

Netscape

CVSS Score

9.3

Found a potential security threat?