You are currently viewing a snapshot of www.mozilla.org taken on April 21, 2008. Most of this content is highly out of date (some pages haven't been updated since the project began in 1998) and exists for historical purposes only. If there are any pages on this archive site that you think should be added back to www.mozilla.org, please file a bug.



You are here: Known Vulnerabilities in Mozilla Products (Firefox 1.5.0.2) > MFSA 2006-22

Mozilla Foundation Security Advisory 2006-22

Title: CSS Letter-Spacing Heap Overflow Vulnerability
Impact: Critical
Date: April 13, 2006
Reporter: TippingPoint and the Zero Day Initiative
Products: Firefox, Thunderbird, Mozilla Suite

Fixed in: Firefox 1.5.0.2
  Firefox 1.0.8
  Thunderbird 1.5.0.2
  Thunderbird 1.0.8
  SeaMonkey 1.0.1
  Mozilla Suite 1.7.13

Description

An anonymous researcher for TippingPoint and the Zero Day Initiative discovered an integer overflow triggered by the CSS letter-spacing property. This results in in under-allocating memory and ultimately a heap buffer overflow which could be exploited to run code of the attacker's choice.

The overflow condition itself does not require JavaScript and thus could affect Thunderbird via received mail, but without scripting to prepare memory it may not be possible to exploit this condition in mail.

Workaround

Upgrade to the fixed version.

References