Closed Bug 382295 Opened 15 years ago Closed 15 years ago

Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access.

Categories

(Firefox :: Security, defect)

All
Linux
defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 379390

People

(Reporter: bathym, Unassigned)

Details

User-Agent:       Mozilla/5.0 (X11; U; Linux i686; it; rv:1.8.1.3) Gecko/20070528 Firefox/2.0.0.3
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; it; rv:1.8.1.3) Gecko/20070528 Firefox/2.0.0.3

Hello,

I'm Gentoo Linux developer to Security,
i'd like if we see our bug:

http://bugs.gentoo.org/show_bug.cgi?id=180159

Reproducible: Always

Steps to Reproduce:
1.
2.
3.
Looked at the posted link and it gave me a trojan warning from NOD32.
it's simple href to "AAA....AA". 
please wake up, and uninstal nod32 :)
Fixed on trunk?
not fixed now.
Status: UNCONFIRMED → RESOLVED
Closed: 15 years ago
Resolution: --- → DUPLICATE
Duplicate of bug: 379390
Summary: Vulnerability can be exploited by using a large value in a href tag to create Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access. → Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access.
You need to log in before you can comment on or make changes to this bug.