Vulnerability Note VU#427972

Mozilla denial of service vulnerability

Original Release date: 18 Jan 2007 | Last revised: 04 Jun 2007

Overview

Certain Mozilla products contain a denial-of-service vulnerability.

Description

Certain Mozilla products contain a denial-of-service vulnerability that occurs because of an infinite loop in the js_dtoa function. Mozilla Firefox versions prior to 2.0.0.1, Thunderbird prior to 1.5.0.9, and other Mozilla products may be affected.

According to Mozilla Foundation Security Advisory 2006-68:

    Keith Victor reported that if the floating point precision of the CPU was reduced (which can happen on windows by loading a plugin which creates a Direct3D device) then it is possible that js_dtoa() will not exit and instead overwrite memory. None of the most common plugins in use do this which lowers the overall impact of this vulnerability to moderate.

Impact

A remote unauthenticated attacker may be able to cause a denial-of-service condition.

Solution

Upgrade
The Mozilla Foundation has released upgrades that address this issue. See Mozilla Foundation Security Advisory 2006-68 for more information.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MozillaAffected-21 Dec 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Igor Bukanov, Jesse Ruderman, moz_bug_r_a4, Mozilla for providing information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2006-6499
  • Date Public: 19 Dec 2006
  • Date First Published: 18 Jan 2007
  • Date Last Updated: 04 Jun 2007
  • Severity Metric: 0.30
  • Document Revision: 41

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.