{"vuid":"VU#327560","idnumber":"327560","name":"Mozilla \"send page\" feature contains a buffer overflow vulnerability","keywords":["Mozilla","send page feature","long URL","buffer overflow","nsMsgCompUtils.cpp","mime_generate_attachment_headers","PUSH_STRING"],"overview":"There is a buffer overflow vulnerability in the Mozilla \"send page\" feature that could allow a remote attacker to execute arbitrary code.","clean_desc":"Mozilla is an open-source web browser, email/newsgroup client, IRC client, and HTML editor available for a number of platforms including Microsoft Windows, Linux, and other UNIX platforms. The email client provides a \"send page\" feature that allows users to easily attach a web page to an email message and forward that page to a specified email address. There is a vulnerability in the way the \"send page\" feature handles overly long URLs that could trigger a buffer overflow condition.","impact":"By convincing a user to send a specially crafted URL using the \"send page\" feature, an attacker could execute arbitrary code with privileges of the vulnerable process.","resolution":"Upgrade Upgrade as specified by your vendor. This issue has been resolved in Mozilla 1.7.3, Firefox Preview Release, and Thunderbird 0.8.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Georgi Guninski.","author":"This document was written by Damon Morda.","public":["http://bugzilla.mozilla.org/show_bug.cgi?id=258005","http://secunia.com/advisories/12526/","http://www.securitytracker.com/alerts/2004/Sep/1011317.html","http://www.securitytracker.com/alerts/2004/Sep/1011318.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-09-16T12:56:30Z","publicdate":"2004-09-04T00:00:00Z","datefirstpublished":"2004-09-17T18:08:05Z","dateupdated":"2004-09-17T18:08:14Z","revision":13,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"2","cam_attackeraccessrequired":"20","cam_scorecurrent":"5.7375","cam_scorecurrentwidelyknown":"6.69375","cam_scorecurrentwidelyknownexploited":"10.51875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.7375,"vulnote":null}