{"vuid":"VU#125776","idnumber":"125776","name":"Multiple buffer overflows in Mozilla POP3 protocol handler","keywords":["Mozilla","nsPop3Protocol.cpp","FreeMsgInfo()","GetXtndXlstMsgid()","GetUidlList()","GetList()","msg_num","msg_info","arbitrary code execution","buffer overflow"],"overview":"There are multiple buffer overflow vulnerabilities in the Mozilla POP3 protocol handler that could allow a remote attacker to execute arbitrary code.","clean_desc":"Post Office Protocol Version 3 (POP3) is a mail protocol that provides a means for retrieving email from a remote server. The Mozilla mail client supports the POP3 protocol. There are multiple vulnerabilities in a number of functions used by the Mozilla POP3 protocol handler. The vulnerable functions include: FreeMsgInfo(), GetXtndXlstMsgid(), GetUidlList(), and GetList(). When processing POP3 responses, a specially crafted response could trigger a buffer overflow condition.","impact":"By sending a specially crafted POP3 response to an affected client, a remote attacker could cause the client to crash or potentially execute arbitrary code. Exploitation of this vulnerability would require a user to connect to a malicious POP3 server.","resolution":"Upgrade Upgrade as specified by your vendor. This issue has been resolved in Mozilla 1.7.3, Firefox Preview Release, and Thunderbird 0.8.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Gael Delalleau.","author":"This document was written by Damon Morda.","public":["http://bugzilla.mozilla.org/show_bug.cgi?id=245066","http://bugzilla.mozilla.org/show_bug.cgi?id=226669","http://secunia.com/advisories/12526/","http://www.securitytracker.com/alerts/2004/Sep/1011317.html","http://www.securitytracker.com/alerts/2004/Sep/1011318.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-09-16T15:45:12Z","publicdate":"2004-05-29T00:00:00Z","datefirstpublished":"2004-09-17T18:07:13Z","dateupdated":"2004-09-17T18:07:22Z","revision":13,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"28.6875","cam_scorecurrentwidelyknown":"33.46875","cam_scorecurrentwidelyknownexploited":"52.59375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":28.6875,"vulnote":null}