Overview
Mozilla products, including the Mozilla Suite, Mozilla Firefox, and Mozilla Thunderbird, are vulnerable to a heap-based overflow in the GIF image-processing routines.
Description
The Mozilla project produces an application suite (Mozilla Suite), web browsers (Mozilla Firefox), email software (Mozilla Thunderbird), and other products. An image processing library used in some Mozilla products contains a flaw in Graphic Interchange Format (GIF) file handling. A Netscape-specific extension block (Netscape extension 2) may be present in the GIF file that contains a 32-bit integer. This integer is used to determine image buffer space. An attacker may misrepresent this value to exploit a heap overflow condition. The attacker can craft a special GIF file that, when viewed, induces a heap overflow in the Mozilla product that is processing the GIF file. |
Impact
A remote unauthenticated attacker can execute arbitrary code as the local user if the user loads a specially crafted GIF file (for example, a GIF-format image in a web page or email message). |
Solution
Apply an update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Mark Dowd and the rest of ISS X-Force for reporting this vulnerability.
This document was written by Ken MacInnis.
Other Information
CVE IDs: | CVE-2005-0399 |
Severity Metric: | 17.55 |
Date Public: | 2005-03-23 |
Date First Published: | 2005-03-30 |
Date Last Updated: | 2005-12-22 20:14 UTC |
Document Revision: | 35 |