Schweregrad: : Crítico
  Identificador(es) CVE: : CVE-2008-2811
  Data do informe: 21 julho 2015

  Descrição

The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.

  Exposição das informações

Apply associated Trend Micro DPI Rules.

  Solução

  Trend Micro Deep Security DPI Rule Number: 1002618
  Trend Micro Deep Security DPI Rule Name: 1002618 - Mozilla Firefox Block Reflow Code Execution Vulnerability

  Software infectado e versão:

  • mozilla firefox 2.0
  • mozilla firefox 2.0.0.1
  • mozilla firefox 2.0.0.10
  • mozilla firefox 2.0.0.11
  • mozilla firefox 2.0.0.12
  • mozilla firefox 2.0.0.13
  • mozilla firefox 2.0.0.14
  • mozilla firefox 2.0.0.2
  • mozilla firefox 2.0.0.3
  • mozilla firefox 2.0.0.4
  • mozilla firefox 2.0.0.5
  • mozilla firefox 2.0.0.6
  • mozilla firefox 2.0.0.7
  • mozilla firefox 2.0.0.8
  • mozilla firefox 2.0.0.9
  • mozilla seamonkey 1.1
  • mozilla seamonkey 1.1.2
  • mozilla seamonkey 1.1.3
  • mozilla seamonkey 1.1.4
  • mozilla seamonkey 1.1.5
  • mozilla seamonkey 1.1.6
  • mozilla seamonkey 1.1.7
  • mozilla seamonkey 1.1.8
  • mozilla seamonkey 1.1.9
  • mozilla thunderbird 2.0.0.0
  • mozilla thunderbird 2.0.0.1
  • mozilla thunderbird 2.0.0.11
  • mozilla thunderbird 2.0.0.12
  • mozilla thunderbird 2.0.0.13
  • mozilla thunderbird 2.0.0.14
  • mozilla thunderbird 2.0.0.2
  • mozilla thunderbird 2.0.0.3
  • mozilla thunderbird 2.0.0.4
  • mozilla thunderbird 2.0.0.6
  • mozilla thunderbird 2.0.0.8
  • mozilla thunderbird 2.0.0.5
  • mozilla thunderbird 2.0.0.9