National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2005-2871 Detail

Description

Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.

Source:  MITRE      Last Modified:  09/09/2005

Quick Info

CVE Dictionary Entry:
CVE-2005-2871
Original release date:
09/09/2005
Last revised:
07/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
7.5 HIGH
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Provides user account access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0316.html External Source FULLDISC 20050911 FireFox "Host:" Buffer Overflow is not just exploitable on FireFox
http://marc.info/?l=full-disclosure&m=112624614008387&w=2 External Source FULLDISC 20050909 Mozilla Firefox "Host:" Buffer Overflow
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1287 Tool Signature; US Government Resource External Source OVAL oval:org.mitre.oval:def:1287
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:584 Tool Signature; US Government Resource External Source OVAL oval:org.mitre.oval:def:584
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9608 External Source OVAL oval:org.mitre.oval:def:9608
http://securityreason.com/securityalert/83 External Source SREASON 83
http://securitytracker.com/id?1014877 External Source SECTRACK 1014877
http://www.ciac.org/ciac/bulletins/p-303.shtml External Source CIAC P-303
http://www.debian.org/security/2005/dsa-837 External Source DEBIAN DSA-837
http://www.debian.org/security/2005/dsa-866 External Source DEBIAN DSA-866
http://www.debian.org/security/2005/dsa-868 External Source DEBIAN DSA-868
http://www.gentoo.org/security/en/glsa/glsa-200509-11.xml External Source GENTOO GLSA-200509-11
http://www.kb.cert.org/vuls/id/573857 US Government Resource External Source CERT-VN VU#573857
http://www.mandriva.com/security/advisories?name=MDKSA-2005:174 External Source MANDRIVA MDKSA-2005:174
http://www.mozilla.org/security/announce/mfsa2005-57.html External Source CONFIRM http://www.mozilla.org/security/announce/mfsa2005-57.html
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html External Source FEDORA FLSA-2006:168375
http://www.redhat.com/support/errata/RHSA-2005-768.html External Source REDHAT RHSA-2005:768
http://www.redhat.com/support/errata/RHSA-2005-769.html External Source REDHAT RHSA-2005:769
http://www.redhat.com/support/errata/RHSA-2005-791.html External Source REDHAT RHSA-2005:791
http://www.securiteam.com/securitynews/5RP0B0UGVW.html External Source MISC http://www.securiteam.com/securitynews/5RP0B0UGVW.html
http://www.securityfocus.com/bid/14784 External Source BID 14784
http://www.security-protocols.com/advisory/sp-x17-advisory.txt Exploit; Vendor Advisory External Source MISC http://www.security-protocols.com/advisory/sp-x17-advisory.txt
http://www.security-protocols.com/firefox-death.html Exploit External Source MISC http://www.security-protocols.com/firefox-death.html
http://www.ubuntu.com/usn/usn-181-1 External Source UBUNTU USN-181-1
http://www.vupen.com/english/advisories/2005/1690 External Source VUPEN ADV-2005-1690
http://www.vupen.com/english/advisories/2005/1691 External Source VUPEN ADV-2005-1691
http://www.vupen.com/english/advisories/2005/1824 External Source VUPEN ADV-2005-1824
https://bugzilla.mozilla.org/show_bug.cgi?id=307259 External Source CONFIRM https://bugzilla.mozilla.org/show_bug.cgi?id=307259
https://exchange.xforce.ibmcloud.com/vulnerabilities/22207 External Source XF mozilla-url-bo(22207)

References to Check Content

Identifier:
oval:org.mitre.oval:def:1287
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1287
Identifier:
oval:org.mitre.oval:def:584
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:584
Identifier:
oval:org.mitre.oval:def:9608
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:9608

Technical Details

Vulnerability Type (View All)

Change History 4 change records found - show changes