Overview
The Mozilla SVG viewer contains an integer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code, or create a denial-of-service condition.
Description
Scalable Vector Graphics (SVG) is an XML markup language for describing and displaying animated or static vector graphics. Mozilla Firefox includes a native SVG viewer, other Mozilla projects may use the Adobe SVG viewer. The Mozilla SVG viewer fails to properly validate size parameters supplied to a memory allocation routine allowing an integer overflow to occur. This vulnerability could cause an undersized buffer to be allocated. When data is copied to that buffer, a heap-based buffer overflow may occur. An attacker may be able to exploit this vulnerability by convincing a user to go to a website that hosts a specially crafted SVG file. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code, or create a denial-of-service condition. |
Solution
Upgrade |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 0 | AV:--/AC:--/Au:--/C:--/I:--/A:-- |
Temporal | 0 | E:ND/RL:ND/RC:ND |
Environmental | 0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- http://www.mozilla.org/security/announce/2007/mfsa2007-01.html
- http://www.mozilla.org/projects/svg/
- http://www.adobe.com/svg/
- http://kb.mozillazine.org/Firefox_:_FAQs_:_About:config_Entries#Miscellaneous
- http://en.wikipedia.org/wiki/Scalable_Vector_Graphics
- http://www.w3.org/TR/SVG/painting.html#StrokeProperties
- http://secunia.com/advisories/24238/
- http://secunia.com/advisories/24287/
- http://secunia.com/advisories/24205/
- http://secunia.com/advisories/24290/
- http://secunia.com/advisories/24252/
- http://secunia.com/advisories/24320/
- http://secunia.com/advisories/24328/
- http://secunia.com/advisories/24293/
- http://secunia.com/advisories/24327/
- http://secunia.com/advisories/24343/
- http://secunia.com/advisories/24333/
- http://secunia.com/advisories/24393/
- http://secunia.com/advisories/24352/
- http://www.ciac.org/ciac/bulletins/r-164.shtml
- http://secunia.com/advisories/24406/
- http://secunia.com/advisories/24384/
- http://secunia.com/advisories/24410/
- http://secunia.com/advisories/24389/
- http://secunia.com/advisories/24455/
- http://secunia.com/advisories/24456/
- http://secunia.com/advisories/24457/
- http://www.securityfocus.com/bid/22694
- http://secunia.com/advisories/24437/
Acknowledgements
Mozilla credits Tom Ferris for reporting this vulnerability.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2007-0776 |
Severity Metric: | 22.23 |
Date Public: | 2007-02-23 |
Date First Published: | 2007-02-25 |
Date Last Updated: | 2008-07-25 12:26 UTC |
Document Revision: | 71 |