bugzilla.mozilla.org has resumed normal operation. Attachments prior to 2014 will be unavailable for a few days. This is tracked in Bug 1475801.
Please report any other irregularities here.

Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access.

RESOLVED DUPLICATE of bug 379390

Status

()

Firefox
Security
--
critical
RESOLVED DUPLICATE of bug 379390
11 years ago
11 years ago

People

(Reporter: Emanuele Gentili, Unassigned)

Tracking

Firefox Tracking Flags

(Not tracked)

Details

(Reporter)

Description

11 years ago
User-Agent:       Mozilla/5.0 (X11; U; Linux i686; it; rv:1.8.1.3) Gecko/20070528 Firefox/2.0.0.3
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; it; rv:1.8.1.3) Gecko/20070528 Firefox/2.0.0.3

Hello,

I'm Gentoo Linux developer to Security,
i'd like if we see our bug:

http://bugs.gentoo.org/show_bug.cgi?id=180159

Reproducible: Always

Steps to Reproduce:
1.
2.
3.

Comment 1

11 years ago
Looked at the posted link and it gave me a trojan warning from NOD32.
(Reporter)

Comment 2

11 years ago
it's simple href to "AAA....AA". 
please wake up, and uninstal nod32 :)

Comment 3

11 years ago
Fixed on trunk?
(Reporter)

Comment 4

11 years ago
not fixed now.
Status: UNCONFIRMED → RESOLVED
Last Resolved: 11 years ago
Resolution: --- → DUPLICATE
Duplicate of bug: 379390

Updated

11 years ago
Summary: Vulnerability can be exploited by using a large value in a href tag to create Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access. → Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access.
You need to log in before you can comment on or make changes to this bug.