Mozilla Firefox Block Reflow Code Execution Vulnerability
Severity: CRITICAL
CVE Identifier: CVE-2008-2811
Advisory Date: JUL 21, 2015
DESCRIPTION
The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.
TREND MICRO PROTECTION INFORMATION
Apply associated Trend Micro DPI Rules.
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1002618
Trend Micro Deep Security DPI Rule Name: 1002618 - Mozilla Firefox Block Reflow Code Execution Vulnerability
AFFECTED SOFTWARE AND VERSION
- mozilla firefox 2.0
- mozilla firefox 2.0.0.1
- mozilla firefox 2.0.0.10
- mozilla firefox 2.0.0.11
- mozilla firefox 2.0.0.12
- mozilla firefox 2.0.0.13
- mozilla firefox 2.0.0.14
- mozilla firefox 2.0.0.2
- mozilla firefox 2.0.0.3
- mozilla firefox 2.0.0.4
- mozilla firefox 2.0.0.5
- mozilla firefox 2.0.0.6
- mozilla firefox 2.0.0.7
- mozilla firefox 2.0.0.8
- mozilla firefox 2.0.0.9
- mozilla seamonkey 1.1
- mozilla seamonkey 1.1.2
- mozilla seamonkey 1.1.3
- mozilla seamonkey 1.1.4
- mozilla seamonkey 1.1.5
- mozilla seamonkey 1.1.6
- mozilla seamonkey 1.1.7
- mozilla seamonkey 1.1.8
- mozilla seamonkey 1.1.9
- mozilla thunderbird 2.0.0.0
- mozilla thunderbird 2.0.0.1
- mozilla thunderbird 2.0.0.11
- mozilla thunderbird 2.0.0.12
- mozilla thunderbird 2.0.0.13
- mozilla thunderbird 2.0.0.14
- mozilla thunderbird 2.0.0.2
- mozilla thunderbird 2.0.0.3
- mozilla thunderbird 2.0.0.4
- mozilla thunderbird 2.0.0.6
- mozilla thunderbird 2.0.0.8
- mozilla thunderbird 2.0.0.5
- mozilla thunderbird 2.0.0.9