Closed
Bug 382295
Opened 17 years ago
Closed 17 years ago
Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access.
Categories
(Firefox :: Security, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 379390
People
(Reporter: bathym, Unassigned)
Details
User-Agent: Mozilla/5.0 (X11; U; Linux i686; it; rv:1.8.1.3) Gecko/20070528 Firefox/2.0.0.3 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; it; rv:1.8.1.3) Gecko/20070528 Firefox/2.0.0.3 Hello, I'm Gentoo Linux developer to Security, i'd like if we see our bug: http://bugs.gentoo.org/show_bug.cgi?id=180159 Reproducible: Always Steps to Reproduce: 1. 2. 3.
Comment 1•17 years ago
|
||
Looked at the posted link and it gave me a trojan warning from NOD32.
Reporter | ||
Comment 2•17 years ago
|
||
it's simple href to "AAA....AA". please wake up, and uninstal nod32 :)
Comment 3•17 years ago
|
||
Fixed on trunk?
Reporter | ||
Comment 4•17 years ago
|
||
not fixed now.
Updated•17 years ago
|
Status: UNCONFIRMED → RESOLVED
Closed: 17 years ago
Resolution: --- → DUPLICATE
Updated•17 years ago
|
Summary: Vulnerability can be exploited by using a large value in a href tag to create Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access. → Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access.
You need to log in
before you can comment on or make changes to this bug.
Description
•