search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Mozilla contains integer overflows in bitmap image decoder

Vulnerability Note VU#847200

Original Release Date: 2004-09-17 | Last Revised: 2004-09-17

Overview

A vulnerability in the way Mozilla and its derived programs handle certain bitmap images could allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

The Mozilla web browser and related Mozilla products support the ability to natively display a number of image formats. Multiple integer overflow errors exist in the way that some versions of these products handle bitmap images (.bmp). These errors result in various vulnerabilities when the affected application handles overly wide bitmap files. An attacker with the ability to supply a specially crafted bitmap image to the affected application may be able to exploit these vulnerabilities. Such malicious images could be supplied remotely in a web page or in an email message.

Impact

The impacts of these vulnerabilities vary depending on what system the software is running on. In some cases, a remote attacker may be able to execute arbitrary code with the privileges of the user running an affected program. In other cases, an attacker may be able to cause the affected program to crash.

Solution

Upgrade to a fixed version of the affected software

The Mozilla Project has released new versions of the affected software that include patches for this vulnerability. Please see the Systems Affected section of this document for more information.

Workarounds


Users who are unable to upgrade to a patched version of the software are encouraged to disable image loading in their affected product.

Vendor Information

847200
 

Mozilla Affected

Updated:  September 17, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The Mozilla project has released the following versions of the affected software that contain a patch for this issue:


Users are strongly encouraged to upgrade to one of these versions.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Information about this issue was originally published by the Mozilla Project. The Mozilla Project, in turn, credits Gaël Delalleau with the discovery and reporting of this issue.

This document was written by Chad R Dougherty.

Other Information

CVE IDs: None
Severity Metric: 23.14
Date Public: 2004-09-14
Date First Published: 2004-09-17
Date Last Updated: 2004-09-17 18:09 UTC
Document Revision: 10

Sponsored by CISA.