First published: Mon Feb 26 2007(Updated: )
Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=2.0.0.1 | |
Mozilla SeaMonkey | <=1.0.7 | |
Thunderbird | <=1.5.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0776 is considered to be a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2007-0776, update Mozilla Firefox to version 2.0.0.2 or later, Mozilla Thunderbird to version 1.5.0.10 or later, and Mozilla SeaMonkey to version 1.0.8 or later.
CVE-2007-0776 affects Mozilla Firefox versions earlier than 2.0.0.2, Thunderbird versions earlier than 1.5.0.10, and SeaMonkey versions earlier than 1.0.8.
CVE-2007-0776 is classified as a heap-based buffer overflow vulnerability.
Yes, CVE-2007-0776 can be exploited by using malicious SVG files with a large stroke-width attribute in the clipPath element.