header-logo
Suggest Exploit
vendor:
Firefox and Thunderbird
by:
posidron@tripbit.net

Mozilla

A buffer overflow vulnerability exists in Mozilla Firefox and Mozilla Thunderbird versions 1.0.7 and 1.0.6 respectively. The vulnerability is caused due to a boundary error within the 'nsSVGPathDataParser.cpp' component when processing SVG Path data. This can be exploited to cause a stack-based buffer overflow by supplying a specially crafted SVG file containing an overly long 'd' attribute of a 'path' element. Successful exploitation allows execution of arbitrary code.

Mitigation:

Upgrade to Mozilla Firefox version 1.5.0.7 or later, or Mozilla Thunderbird version 1.5.0.7 or later.
Source

Exploit-DB raw data:

<!--
posidron@tripbit.net

Vulnerable: Mozilla Firefox <= 1.0.7
            Mozilla Thunderbird  <= 1.0.6

-->

<html><body><strong>Mozilla<sourcetext></body></html>

# milw0rm.com [2005-10-16]