Mozilla Firefox Graphics Rendering Remote Code Execution
Publish date: 21 de julio de 2015
Gravedad: Crítico
Identificadores de CVE : CVE-2008-4064
Fecha recomendada: 21 de julio de 2015
Descripción
Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to graphics rendering and (1) handling of a long alert messagebox in the cairo_surface_set_device_offset function, (2) integer overflows when handling animated PNG data in the info_callback function in nsPNGDecoder.cpp, and (3) an integer overflow when handling SVG data in the nsSVGFEGaussianBlurElement::SetupPredivide function in nsSVGFilters.cpp.
nvd: NOTE: Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in mail. Without further investigation we cannot rule out the possibility that for some of these an attacker might be able to prepare memory for exploitation through some means other than JavaScript such as large images.
Revelación de la información
Apply associated Trend Micro DPI Rules.
Soluciones
Trend Micro Deep Security DPI Rule Number: 1002919
Trend Micro Deep Security DPI Rule Name: 1002919 - Mozilla Firefox Animated PNG Processing Integer Overflow
Software y versión afectados
- Mozilla Firefox 3.0
- Mozilla Firefox 3.0.1