First published: Fri Sep 09 2005(Updated: )
Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =1.0.2 | |
Mozilla Firefox | =1.5-beta1 | |
Mozilla Firefox | =1.0.4 | |
Mozilla Firefox | =1.0 | |
Mozilla Firefox | =1.0.1 | |
Mozilla Firefox | =1.0.3 | |
Mozilla Firefox | =1.0.5 | |
Mozilla Firefox | =1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.