First published: Fri Sep 23 2005(Updated: )
Heap-based buffer overflow in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox and Thunderbird | <=1.0.6 | |
Mozilla Firefox and Thunderbird | =1.0 | |
Mozilla Firefox and Thunderbird | =1.0.1 | |
Mozilla Firefox and Thunderbird | =1.0.2 | |
Mozilla Firefox and Thunderbird | =1.0.3 | |
Mozilla Firefox and Thunderbird | =1.0.4 | |
Mozilla Firefox and Thunderbird | =1.0.5 | |
Mozilla Suite | <=1.7.11 | |
Mozilla Suite | =1.7.6 | |
Mozilla Suite | =1.7.7 | |
Mozilla Suite | =1.7.8 | |
Mozilla Suite | =1.7.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2701 has been classified as a critical vulnerability due to its potential for remote code execution.
CVE-2005-2701 affects all Firefox versions prior to 1.0.7.
To mitigate CVE-2005-2701, upgrade Firefox or Mozilla Suite to the latest versions that include security patches.
CVE-2005-2701 allows remote attackers to execute arbitrary code by exploiting a heap-based buffer overflow.
Yes, CVE-2005-2701 can be exploited via specially crafted XBM image files.