CVE-2005-2871

NameCVE-2005-2871
DescriptionBuffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-837-1, DSA-866-1, DSA-868-1
Debian Bugs327366, 327452, 327455, 327802

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mozillasourcewoody(unfixed)DSA-866-1
mozillasourcesarge1:1.7.8-1sarge3DSA-866-1
mozillasource(unstable)2:1.7.12-1medium327455
mozilla-firefoxsourcesarge1.0.4-2sarge4mediumDSA-837-1327452
mozilla-firefoxsource(unstable)1.0.6-5medium327366, 327452, 327802
mozilla-thunderbirdsourcesarge1.0.2-2.sarge1.0.7DSA-868-1
mozilla-thunderbirdsource(unstable)1.0.7-1

Notes

epiphany-browser is apparently fixed fix the mozilla
upload; see bug #327366

Search for package or bug name: Reporting problems