Gravité: : Critique
  Identifiant(s) CVE: : CVE-2008-2811
  Date du conseil: 21 juillet 2015

  Description

The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.

  Information Exposure Rating:

Apply associated Trend Micro DPI Rules.

  Solutions

  Trend Micro Deep Security DPI Rule Number: 1002618
  Trend Micro Deep Security DPI Rule Name: 1002618 - Mozilla Firefox Block Reflow Code Execution Vulnerability

  Affected software and version:

  • mozilla firefox 2.0
  • mozilla firefox 2.0.0.1
  • mozilla firefox 2.0.0.10
  • mozilla firefox 2.0.0.11
  • mozilla firefox 2.0.0.12
  • mozilla firefox 2.0.0.13
  • mozilla firefox 2.0.0.14
  • mozilla firefox 2.0.0.2
  • mozilla firefox 2.0.0.3
  • mozilla firefox 2.0.0.4
  • mozilla firefox 2.0.0.5
  • mozilla firefox 2.0.0.6
  • mozilla firefox 2.0.0.7
  • mozilla firefox 2.0.0.8
  • mozilla firefox 2.0.0.9
  • mozilla seamonkey 1.1
  • mozilla seamonkey 1.1.2
  • mozilla seamonkey 1.1.3
  • mozilla seamonkey 1.1.4
  • mozilla seamonkey 1.1.5
  • mozilla seamonkey 1.1.6
  • mozilla seamonkey 1.1.7
  • mozilla seamonkey 1.1.8
  • mozilla seamonkey 1.1.9
  • mozilla thunderbird 2.0.0.0
  • mozilla thunderbird 2.0.0.1
  • mozilla thunderbird 2.0.0.11
  • mozilla thunderbird 2.0.0.12
  • mozilla thunderbird 2.0.0.13
  • mozilla thunderbird 2.0.0.14
  • mozilla thunderbird 2.0.0.2
  • mozilla thunderbird 2.0.0.3
  • mozilla thunderbird 2.0.0.4
  • mozilla thunderbird 2.0.0.6
  • mozilla thunderbird 2.0.0.8
  • mozilla thunderbird 2.0.0.5
  • mozilla thunderbird 2.0.0.9