Short Name |
HTTP:STC:MOZILLA:MAL-REG-EX |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
HTTP |
Keywords |
Mozilla Products Malformed Regular Expressions |
Release Date |
2010/09/22 |
Update Number |
1777 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Mozilla Internet suite. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the client.
The Mozilla Foundation has released six security advisories specifying vulnerabilities in Mozilla Firefox, SeaMonkey, and Thunderbird. These vulnerabilities allow attackers to: - execute arbitrary code - perform cross-site scripting attacks - supply malicious data through updates - inject arbitrary content - execute arbitrary JavaScript - crash affected applications and potentially execute arbitrary code. Other attacks may also be possible. The issues described here will be split into individual BIDs as more information becomes available. These issues are fixed in: - Mozilla Firefox version 1.5.0.7 - Mozilla Thunderbird version 1.5.0.7 - Mozilla SeaMonkey version 1.0.5