Vulnerability Note VU#551436
Mozilla Firefox SVG viewer vulnerable to integer overflow
The Mozilla SVG viewer contains an integer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code, or create a denial-of-service condition.
Scalable Vector Graphics (SVG) is an XML markup language for describing and displaying animated or static vector graphics. Mozilla Firefox includes a native SVG viewer, other Mozilla projects may use the Adobe SVG viewer.
The Mozilla SVG viewer fails to properly validate size parameters supplied to a memory allocation routine allowing an integer overflow to occur. This vulnerability could cause an undersized buffer to be allocated. When data is copied to that buffer, a heap-based buffer overflow may occur. An attacker may be able to exploit this vulnerability by convincing a user to go to a website that hosts a specially crafted SVG file.
A remote, unauthenticated attacker may be able to execute arbitrary code, or create a denial-of-service condition.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Mozilla||Affected||-||25 Feb 2007|
CVSS Metrics (Learn More)
Mozilla credits Tom Ferris for reporting this vulnerability.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2007-0776
- Date Public: 23 Feb 2007
- Date First Published: 25 Feb 2007
- Date Last Updated: 25 Jul 2008
- Severity Metric: 22.23
- Document Revision: 69
If you have feedback, comments, or additional information about this vulnerability, please send us email.