Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access.

RESOLVED DUPLICATE of bug 379390

Status

()

--
critical
RESOLVED DUPLICATE of bug 379390
12 years ago
12 years ago

People

(Reporter: bathym, Unassigned)

Tracking

Firefox Tracking Flags

(Not tracked)

Details

(Reporter)

Description

12 years ago
User-Agent:       Mozilla/5.0 (X11; U; Linux i686; it; rv:1.8.1.3) Gecko/20070528 Firefox/2.0.0.3
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; it; rv:1.8.1.3) Gecko/20070528 Firefox/2.0.0.3

Hello,

I'm Gentoo Linux developer to Security,
i'd like if we see our bug:

http://bugs.gentoo.org/show_bug.cgi?id=180159

Reproducible: Always

Steps to Reproduce:
1.
2.
3.

Comment 1

12 years ago
Looked at the posted link and it gave me a trojan warning from NOD32.
(Reporter)

Comment 2

12 years ago
it's simple href to "AAA....AA". 
please wake up, and uninstal nod32 :)

Comment 3

12 years ago
Fixed on trunk?
(Reporter)

Comment 4

12 years ago
not fixed now.
Status: UNCONFIRMED → RESOLVED
Last Resolved: 12 years ago
Resolution: --- → DUPLICATE
Duplicate of bug: 379390

Updated

12 years ago
Summary: Vulnerability can be exploited by using a large value in a href tag to create Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access. → Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access.
You need to log in before you can comment on or make changes to this bug.