Lucene search

K
mozillaMozilla FoundationMFSA2009-38
HistoryJul 21, 2009 - 12:00 a.m.

Data corruption with SOCKS5 reply containing DNS name longer than 15 characters — Mozilla

2009-07-2100:00:00
Mozilla Foundation
www.mozilla.org
9

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.02 Low

EPSS

Percentile

88.7%

Andrej Andolsek reported that when Firefox receives a reply from a SOCKS5 proxy which contains a DNS name longer than 15 characters, the subsequent data stream in the response can become corrupted. There was no evidence of memory corruption, however, and the severity of the issue was determined to be low.

CPENameOperatorVersion
firefoxlt3.0.12
firefoxlt3.5.2

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.02 Low

EPSS

Percentile

88.7%