You are currently viewing a snapshot of www.mozilla.org taken on April 21, 2008. Most of this content is highly out of date (some pages haven't been updated since the project began in 1998) and exists for historical purposes only. If there are any pages on this archive site that you think should be added back to www.mozilla.org, please file a bug.



You are here: Known Vulnerabilities in Mozilla Products (Firefox 1.0.2) > MFSA 2005-30

Mozilla Foundation Security Advisory 2005-30

Title: GIF heap overflow parsing Netscape extension 2
Severity: Critical
Risk: High
Reporter: Mark Dowd (ISS X-Force)
Products: Firefox, Thunderbird, Mozilla Suite

Fixed in: Firefox 1.0.2
  Thunderbird 1.0.2
  Mozilla Suite 1.7.6

Description

An GIF processing error when parsing the obsolete Netscape extension 2 can lead to an exploitable heap overrun, allowing an attacker to run arbitrary code on the user's machine.

Workaround

Turn off image display. Upgrade to the fixed version.

Important Note: The image blocking used in Mozilla Thunderbird and the mail client in the Mozilla Suite only blocks images loaded from remote servers. It will still display "in-line" images and is insufficient to protect against a potential attack. Instead, on the View menu choose "Message Body As" and set it to "Plain Text".

We, of course, recommend upgrading to the fixed version.

References