?? 3634.txt
字號:
Rule:--Sid:3634--Summary:This event is generated when an attempt is made to exploit aninteger overflow associated with Mozilla's processing of amalformed BMP file.--Impact:A successful attack can cause a heap overflow on the client hostrunning Mozilla and permit execution of arbitrary code at theprivilege level of the current user.--Detailed Information:The Mozilla browser is vulnerable to an integer overflow when processingimages in Bitmap (BMP) format. Programming errors may present anattacker with the opportunity to cause the integer overflow due toinsufficient bounds checking in the code that handles bitmap images.--Affected Systems: Mozilla Thunderbird 0.73 and prior Mozilla Firefox 0.9.3 and prior Mozilla browser 1.7.2 and prior Netscape Navigator 7.2 and prior--Attack Scenarios:An attacker can entice a user to view a malicious BMP file that causesthe overflow, enabling execution of arbitrary code on a vulnerable client.--Ease of Attack:Simple. Exploit code is available.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -