CVE-2004-1316

Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*

History

20 Nov 2024, 23:50

Type Values Removed Values Added
References () http://isec.pl/vulnerabilities/isec-0020-mozilla.txt - Exploit, Vendor Advisory () http://isec.pl/vulnerabilities/isec-0020-mozilla.txt - Exploit, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=110436284718949&w=2 - () http://marc.info/?l=bugtraq&m=110436284718949&w=2 -
References () http://marc.info/?l=bugtraq&m=110780717916478&w=2 - () http://marc.info/?l=bugtraq&m=110780717916478&w=2 -
References () http://secunia.com/advisories/19823 - () http://secunia.com/advisories/19823 -
References () http://www.mozilla.org/security/announce/mfsa2005-06.html - Patch, Vendor Advisory () http://www.mozilla.org/security/announce/mfsa2005-06.html - Patch, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2006_04_25.html - () http://www.novell.com/linux/security/advisories/2006_04_25.html -
References () http://www.redhat.com/support/errata/RHSA-2005-038.html - Exploit, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-038.html - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/12131 - () http://www.securityfocus.com/bid/12131 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18711 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18711 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100052 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100052 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9808 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9808 -

Information

Published : 2004-12-29 05:00

Updated : 2024-11-20 23:50


NVD link : CVE-2004-1316

Mitre link : CVE-2004-1316

CVE.ORG link : CVE-2004-1316


JSON object : View

Products Affected

mozilla

  • mozilla