Short Name |
HTTP:STC:MOZILLA:NSCSSVALUE-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Mozilla Products nsCSSValue Array Index Integer Overflow |
Release Date |
2011/08/04 |
Update Number |
1967 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Mozilla Products. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the server.
Mozilla Firefox, Thunderbird, and SeaMonkey are prone to an integer-overflow vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a page containing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. This issue is fixed in: Firefox 3.6.7 Firefox 3.5.11 SeaMonkey 2.0.6 Thunderbird 3.0.6 Thunderbird 3.1.1 NOTE: This issue was previously covered in BID 41824 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-34 Through -47 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.