Mozilla products, including the Mozilla Suite, Mozilla Firefox, and Mozilla Thunderbird, are vulnerable to a heap-based overflow in the GIF image-processing routines.
The Mozilla project produces an application suite (Mozilla Suite), web browsers (Mozilla Firefox), email software (Mozilla Thunderbird), and other products.
An image processing library used in some Mozilla products contains a flaw in Graphic Interchange Format (GIF) file handling. A Netscape-specific extension block (Netscape extension 2) may be present in the GIF file that contains a 32-bit integer. This integer is used to determine image buffer space. An attacker may misrepresent this value to exploit a heap overflow condition. The attacker can craft a special GIF file that, when viewed, induces a heap overflow in the Mozilla product that is processing the GIF file.
A remote unauthenticated attacker can execute arbitrary code as the local user if the user loads a specially crafted GIF file (for example, a GIF-format image in a web page or email message).
Apply an update
Red Hat, Inc.
Thanks to Mark Dowd and the rest of ISS X-Force for reporting this vulnerability.
This document was written by Ken MacInnis.
|Date First Published:||2005-03-30|
|Date Last Updated:||2005-12-22 20:14 UTC|