{"vuid":"VU#414240","idnumber":"414240","name":"Mozilla Mail vulnerable to buffer overflow via \"writeGroup()\" function in \"nsVCardObj.cpp\"","keywords":["Mozilla Mail","buffer overflow","writeGroup()","nsVCardObj.cpp","VCard"],"overview":"Mozilla Mail contains a vulnerability in the display routines for VCards. By sending an email message with a crafted VCard, a remote attacker may be able to execute arbitrary code on the victim's machine with the privileges of the current user.","clean_desc":"Mozilla Mail contains a stack overflow vulnerability in the display routines for VCards. By sending an email message with a crafted VCard, a remote attacker may be able to execute arbitrary code on the victim's machine with the privileges of the current user. This can be exploited in the preview mode as well.","impact":"A remote attacker may be able to execute arbitrary code on the victim's machine with the privileges of the current user.","resolution":"This vulnerability is resolved in Firefox Preview Release, Mozilla 1.7.3, and Thunderbird 0.8.","workarounds":"Until a patch or upgrade can be performed, Mozilla recommends the following workaround; Disable in-line display of attachments, don't open VCard attachments.","sysaffected":"","thanks":"Thanks to Georgi Guninski for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://secunia.com/advisories/12526/","http://bugzilla.mozilla.org/show_bug.cgi?id=257314","http://www.mozilla.org/projects/security/known-vulnerabilities.html","http://www.securitytracker.com/alerts/2004/Sep/1011317.html","http://www.securitytracker.com/alerts/2004/Sep/1011318.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-09-16T13:42:23Z","publicdate":"2004-09-14T00:00:00Z","datefirstpublished":"2004-09-17T18:03:02Z","dateupdated":"2004-09-17T18:03:07Z","revision":9,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"19","cam_exploitation":"0","cam_internetinfrastructure":"13","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"32.4","cam_scorecurrentwidelyknown":"33.4125","cam_scorecurrentwidelyknownexploited":"53.6625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":32.4,"vulnote":null}