CVE-2005-2871

NameCVE-2005-2871
DescriptionBuffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-837-1, DSA-866-1, DSA-868-1
NVD severityhigh (attack range: remote)
Debian Bugs327366, 327452, 327455, 327802
Debian/oldstablenot known to be vulnerable.
Debian/stablenot known to be vulnerable.
Debian/testingnot known to be vulnerable.
Debian/unstablenot known to be vulnerable.

The information above is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mozillasource(unstable)2:1.7.12-1medium327455
mozillasourcesarge1:1.7.8-1sarge3highDSA-866-1
mozillasourcewoody(unfixed)highDSA-866-1
mozilla-firefoxsource(unstable)1.0.6-5medium327366, 327452, 327802
mozilla-firefoxsourcesarge1.0.4-2sarge4mediumDSA-837-1327452
mozilla-thunderbirdsource(unstable)1.0.7-1high
mozilla-thunderbirdsourcesarge1.0.2-2.sarge1.0.7highDSA-868-1

Notes

epiphany-browser is apparently fixed fix the mozilla
upload; see bug #327366

Search for package or bug name: Reporting problems