HTTP: Mozilla Products EnsureCachedAttrParamArrays Integer Overflow

This signature detects attempts to exploit a known vulnerability in Mozilla Products. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Mozilla Firefox and SeaMonkey are prone to a buffer-overflow vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a page containing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. This issue is fixed in: Firefox 3.6.7 Firefox 3.5.11 SeaMonkey 2.0.6 NOTE: This issue was previously covered in BID 41824 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-34 Through -47 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

Affected Products

Avaya messaging_storage_server

References

BugTraq: 41842

CVE: CVE-2010-1214

Short Name
HTTP:STC:MOZILLA:PARAM-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2010-1214 EnsureCachedAttrParamArrays Integer Mozilla Overflow Products bid:41842
Release Date
07/27/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Red_hat

Suse

Sun

Mozilla

Avaya

Slackware

Ubuntu

Debian

CVSS Score

9.3

Found a potential security threat?