Mozilla IDN support buffer overflow

mozilla-url-bo (22207) The risk level is classified as HighHigh Risk

Description:

Mozilla is vulnerable to a heap-based buffer overflow in the International Domain Name (IDN) support functionality. By sending a specially-crafted HTML file containing the 0xAD character in the domain name or persuading a user to visit a malicious Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the system to crash.


Consequences:

Gain Access

Remedy:

As a workaround for Mozilla and Netscape:

  1. Type about:config into the address field and hit Enter.
  2. In the Filter toolbar, type network.enableIDN.
  3. Right click on the the network.enableIDN item and select Toggle to change value to false.

— OR —

For Debian GNU/Linux (Thunderbird):
Refer to DSA-868-1 for patch, upgrade, or suggested workaround information. See References.

For Debian GNU/Linux (Mozilla):
Refer to DSA-866-1 for patch, upgrade, or suggested workaround information. See References.

For Red Hat Linux (Thunderbird):
Refer to RHSA-2005:791-8 for patch, upgrade, or suggested workaround information. See References.

For Red Hat Linux (Firefox):
Refer to RHSA-2005:768-6 for patch, upgrade, or suggested workaround information. See References.

For Red Hat Linux:
Refer to RHSA-2005:769-8 for patch, upgrade, or suggested workaround information. See References.

For Gentoo Linux:
Refer to Gentoo Linux Security Announcement GLSA 2005-09-11 for patch, upgrade, or suggested workaround information. See References.

For Ubuntu Linux:
Refer to USN-181-1 for patch, upgrade or suggested workaround information See References.

For other distributions:
Contact your vendor for upgrade or patch information.

References:

  • CIAC INFORMATION BULLETIN P-303: Firefox and Mozilla Buffer Overflow Vulnerability.
  • Full-Disclosure Mailing List: Fri Sep 09 2005 - 01:09:51 CDT: Mozilla Firefox "Host:" Buffer Overflow.
  • MFSA 2005-57: IDN heap overrun using soft-hyphens.
  • Mozilla Firefox Download Web page: Firefox - Rediscover the web.
  • Mozilla Suite Web page: Mozilla Suite- The All-in-One Internet Application Suite.
  • Netscape Web site: The All New Netscape Browser 8.0.
  • BID-14784: Mozilla/Netscape/Firefox Browsers Domain Name Remote Buffer Overflow Vulnerability
  • CVE-2005-2871: Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all soft hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
  • DSA-837: mozilla-firefox -- buffer overflow
  • DSA-866: mozilla -- several vulnerabilities
  • DSA-868: mozilla-thunderbird -- several vulnerabilities
  • GLSA-200509-11: Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities
  • MDKSA-2005:169: Updated mozilla-firefox packages fix multiple vulnerabilities
  • MDKSA-2005:170: Updated mozilla packages fix multiple vulnerabilities
  • MDKSA-2005:174: Updated mozilla-thunderbird packages fix multiple vulnerabilities
  • OSVDB ID: 19255: Mozilla Multiple Browser International Domain Name (IDN) URL Domain Name Overflow
  • RHSA-2005-768: firefox security update
  • RHSA-2005-769: mozilla security update
  • RHSA-2005-791: thunderbird security update
  • SA16764: Firefox IDN URL Domain Name Buffer Overflow
  • SA16766: Netscape IDN URL Domain Name Buffer Overflow
  • SA16767: Mozilla IDN URL Domain Name Buffer Overflow
  • SECTRACK ID: 1014877: Mozilla Firefox Buffer Overflow in Processing Hostnames May Let Remote Users Execute Arbitrary Code
  • US-CERT VU#573857: Mozilla-based browsers contain a buffer overflow in handling URIs containing a malformed IDN hostname
  • USN-181-1: Mozilla products vulnerability
  • VUPEN/ADV-2005-1690: Mozilla Browsers Host: Parameter Remote Buffer Overflow Vulnerability
  • VUPEN/ADV-2005-1691: Netscape Host: Parameter Remote Buffer Overflow Vulnerability
  • VUPEN/ADV-2005-1824: Mozilla Suite and Firefox Multiple Code Execution Vulnerabilities

Platforms Affected:

  • Canonical Ubuntu 4.10
  • Canonical Ubuntu 5.04
  • Debian Debian Linux 3.1
  • Gentoo Linux
  • MandrakeSoft Mandrake Linux 10.1
  • MandrakeSoft Mandrake Linux 10.1 X86_64
  • MandrakeSoft Mandrake Linux 2006 X86_64
  • MandrakeSoft Mandrake Linux 2006
  • MandrakeSoft Mandrake Linux LE2005
  • MandrakeSoft Mandrake Linux LE2005 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 3.0 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 3.0
  • Mozilla Firefox 1.0
  • Mozilla Firefox 1.0.1
  • Mozilla Firefox 1.0.2
  • Mozilla Firefox 1.0.3
  • Mozilla Firefox 1.0.4
  • Mozilla Firefox 1.0.5
  • Mozilla Firefox 1.0.6
  • Mozilla Firefox 1.5 Beta1
  • Mozilla Mozilla Suite 1.7.11
  • Netscape Navigator 7.2
  • Netscape Navigator 8.0.3.3
  • RedHat Enterprise Linux 2.1 WS
  • RedHat Enterprise Linux 2.1 ES
  • RedHat Enterprise Linux 2.1 AS
  • RedHat Enterprise Linux 3 Desktop
  • RedHat Enterprise Linux 3 WS
  • RedHat Enterprise Linux 3 ES
  • RedHat Enterprise Linux 3 AS
  • RedHat Enterprise Linux 4 WS
  • RedHat Enterprise Linux 4 AS
  • RedHat Enterprise Linux 4 Desktop
  • RedHat Enterprise Linux 4 ES
  • RedHat Linux Advanced Workstation 2.1 Itanium

Reported:

Sep 09, 2005

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page