|Description||Mozilla Firefox before 0.10, Mozilla 5.0, and Gecko 20040913 allows remote attackers to cause a denial of service (application crash or memory consumption) via a large binary file with a .html extension.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||medium (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|iceweasel (PTS)||wheezy, wheezy (security)||38.8.0esr-1~deb7u1||vulnerable|
The information below is based on the following data on fixed versions.
|Package||Type||Release||Fixed Version||Urgency||Origin||Debian Bugs|
This is not a real security issue; it just describes the fact that the Gecko
engine of the Mozillae may be lead into a crash if you feed it with large chunks
of arbitrary binary data and label it as HTML. As the parsing garbage is displayed
during transfer any user will cancel the transfer and if you load it from the
hard disc, well than you have "DoSed" yourself, congratulations.
It's reproducable with 1.0.2, but I doubt it will ever be "fixed", as HTML parsers
generally try to make sense of anything even remotely resembling HTML.