First published: Wed Dec 29 2004(Updated: )
Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Mozilla | =1.7-alpha | |
Mozilla Mozilla | =1.7-rc1 | |
Mozilla Mozilla | =1.5-rc2 | |
Mozilla Mozilla | =1.7 | |
Mozilla Mozilla | =1.6-beta | |
Mozilla Mozilla | =1.4.1 | |
Mozilla Mozilla | =1.5-alpha | |
Mozilla Mozilla | =1.5-rc1 | |
Mozilla Mozilla | =1.3 | |
Mozilla Mozilla | =1.7-beta | |
Mozilla Mozilla | =1.4 | |
Mozilla Mozilla | =1.5 | |
Mozilla Mozilla | ||
Mozilla Mozilla | =1.7.1 | |
Mozilla Mozilla | =1.4-alpha | |
Mozilla Mozilla | =1.5.1 | |
Mozilla Mozilla | =1.7.2 | |
Mozilla Mozilla | =1.7-rc3 | |
Mozilla Mozilla | =1.7-rc2 | |
Mozilla Mozilla | =1.7.3 | |
Mozilla Mozilla | =1.6-alpha | |
Mozilla Mozilla | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1316 has a severity that can lead to a denial of service, as it causes the application to crash.
To fix CVE-2004-1316, update to a version of Mozilla newer than 1.7.3.
CVE-2004-1316 affects Mozilla versions 1.7.3 and earlier.
CVE-2004-1316 is a heap-based buffer overflow vulnerability.
Yes, CVE-2004-1316 can be exploited remotely through specially crafted NNTP URLs.