Short Name |
HTTP:STC:IMG:BMP-WIDTH-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Overlarge BMP Width Parameter |
Release Date |
2004/10/06 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects large bitmap (BMP) files that contain a large width parameter. Attackers can post a BMP file that, when viewed in Mozilla or FireFox Web browser, crashes the browser's system. In some extreme cases, attackers can run arbitrary code on the browser's system. Note: A very wide non-malicious BMP can also trigger this signature.
Mozilla Browser is reportedly prone to multiple integer overflow vulnerabilities in the image parsing routines. These issues exist due to insufficient boundary checks performed by the application. A remote attacker may cause denial of service conditions in the client or execute arbitrary code to gain unauthorized access to a vulnerable computer. These vulnerabilities were researched on Mozilla 1.7, however, other versions may be affected as well. Thunderbird 0.7 was also tested.