Vulnerability Note VU#551436

Mozilla Firefox SVG viewer vulnerable to integer overflow

Original Release date: 25 Feb 2007 | Last revised: 25 Jul 2008


The Mozilla SVG viewer contains an integer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code, or create a denial-of-service condition.


Scalable Vector Graphics (SVG) is an XML markup language for describing and displaying animated or static vector graphics. Mozilla Firefox includes a native SVG viewer, other Mozilla projects may use the Adobe SVG viewer.

The Mozilla SVG viewer fails to properly validate size parameters supplied to a memory allocation routine allowing an integer overflow to occur. This vulnerability could cause an undersized buffer to be allocated. When data is copied to that buffer, a heap-based buffer overflow may occur. An attacker may be able to exploit this vulnerability by convincing a user to go to a website that hosts a specially crafted SVG file.

This vulnerability occurred as a result of failing to comply with rule INT30-C of the CERT C Programming Language Secure Coding Standard.


A remote, unauthenticated attacker may be able to execute arbitrary code, or create a denial-of-service condition.


See Mozilla Foundation Security Advisory 2007-01 for information about affected clients.

Disable SVG

Until updates can be applied, disabling SVG in Mozilla Firefox may mitigate this vulnerability. See the Mozilla about:config guide for information on how to disable SVG.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MozillaAffected-25 Feb 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Mozilla credits Tom Ferris for reporting this vulnerability.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2007-0776
  • Date Public: 23 Feb 2007
  • Date First Published: 25 Feb 2007
  • Date Last Updated: 25 Jul 2008
  • Severity Metric: 22.23
  • Document Revision: 69


If you have feedback, comments, or additional information about this vulnerability, please send us email.