First published: Fri Sep 09 2005(Updated: )
Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =1.0 | |
Firefox | =1.0.1 | |
Firefox | =1.0.2 | |
Firefox | =1.0.3 | |
Firefox | =1.0.4 | |
Firefox | =1.0.5 | |
Firefox | =1.0.6 | |
Firefox | =1.5-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2871 has a severity that can lead to denial of service and potential remote code execution.
To fix CVE-2005-2871, upgrade to the latest version of Mozilla Firefox or Netscape that addresses this vulnerability.
CVE-2005-2871 affects Mozilla Firefox versions 1.0.6 and earlier.
Yes, CVE-2005-2871 can be exploited remotely through specially crafted hostnames with 'soft' hyphens.
CVE-2005-2871 can cause your browser to crash and may allow an attacker to execute arbitrary code.