Vulnerabilities > CVE-2004-0904 - Integer Overflow vulnerability in Mozilla Browser BMP Image Decoding

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
mozilla
netscape
conectiva
redhat
critical
nessus

Summary

Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.

Nessus

  • NASL familyWindows
    NASL idTHUNDERBIRD_MULTIPLE_FLAWS.NASL
    descriptionThe remote host is using Mozilla and/or Thunderbird, an alternative mail user agent. The remote version of this software is vulnerable to several flaws that could allow an attacker to execute arbitrary code on the remote host. To exploit these flaws, an attacker would need to send a rogue email to a victim on the remote host.
    last seen2020-06-01
    modified2020-06-02
    plugin id14729
    published2004-09-15
    reporterThis script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/14729
    titleMozilla < 1.7.3 / Thunderbird < 0.8 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(14729);
     script_version("1.20");
     script_cve_id("CVE-2004-0902", "CVE-2004-0903", "CVE-2004-0904");
     script_bugtraq_id(11174, 11171, 11170);
    
     script_name(english:"Mozilla < 1.7.3 / Thunderbird < 0.8 Multiple Vulnerabilities");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote host has an application that is affected by 
    multiple flaws." );
     script_set_attribute(attribute:"description", value:
    "The remote host is using Mozilla and/or Thunderbird, an 
    alternative mail user agent.
    
    The remote version of this software is vulnerable to 
    several flaws that could allow an attacker to execute 
    arbitrary code on the remote host.
    
    To exploit these flaws, an attacker would need to send a 
    rogue email to a victim on the remote host." );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to Mozilla 1.7.3 or Thunderbird 0.8 or later." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2004/09/15");
     script_set_attribute(attribute:"vuln_publication_date", value: "2004/08/29");
     script_cvs_date("Date: 2018/08/22 16:49:14");
    script_set_attribute(attribute:"plugin_type", value:"local");
    script_set_attribute(attribute:"cpe",value:"cpe:/a:mozilla:mozilla");
    script_set_attribute(attribute:"cpe",value:"cpe:/a:mozilla:thunderbird");
    script_end_attributes();
    
     script_summary(english:"Determines the version of Mozilla");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
     script_family(english:"Windows");
     script_dependencies("mozilla_org_installed.nasl");
     script_require_keys("Mozilla/Thunderbird/Version");
     exit(0);
    }
    
    #
    
    include("misc_func.inc");
    
    
    ver = read_version_in_kb("Mozilla/Version");
    if (!isnull(ver))
    {
      if (
        ver[0] < 1 ||
        (
          ver[0] == 1 &&
          (
            ver[1] < 7 ||
            (ver[1] == 7 && ver[2] < 3)
          )
        )
      )  security_hole(get_kb_item("SMB/transport"));
    }
    
    ver = read_version_in_kb("Mozilla/Thunderbird/Version");
    if (!isnull(ver))
    {
      if (ver[0] == 0 && ver[1] < 8)
        security_hole(get_kb_item("SMB/transport"));
    }
    
  • NASL familyWindows
    NASL idMOZILLA_MULTIPLE_FLAWS.NASL
    descriptionThe remote host is using Mozilla and/or Firefox, a web browser. The remote version of this software is vulnerable to several flaws that could allow an attacker to execute arbitrary code on the remote host, get access to content of the user clipboard or, perform a cross-domain cross-site scripting attack. A remote attacker could exploit these issues by tricking a user into viewing a malicious web page.
    last seen2020-06-01
    modified2020-06-02
    plugin id14728
    published2004-09-15
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14728
    titleMozilla Browsers Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    
    if(description)
    {
     script_id(14728);
     script_version("1.24");
     script_cve_id(
       "CVE-2004-0904", 
       "CVE-2004-0905", 
       "CVE-2004-0906", 
       "CVE-2004-0908"
     );
     script_bugtraq_id(
       11194, 
       11192, 
       11169, 
       11171, 
       11177, 
       11179 
     );
    
     script_name(english:"Mozilla Browsers Multiple Vulnerabilities");
     script_summary(english:"Determines the version of Mozilla");
     
     script_set_attribute( attribute:"synopsis", value:
    "The remote Windows host contains a web browser that is affected by
    multiple vulnerabilities." );
     script_set_attribute( attribute:"description",  value:
    "The remote host is using Mozilla and/or Firefox, a web browser.
    
    The remote version of this software is vulnerable to several flaws
    that could allow an attacker to execute arbitrary code on the remote
    host, get access to content of the user clipboard or, perform
    a cross-domain cross-site scripting attack.
    
    A remote attacker could exploit these issues by tricking a user
    into viewing a malicious web page." );
     script_set_attribute(
       attribute:"solution", 
       value:"Upgrade to Mozilla 1.7.3 / Firefox 0.10.0 or later."
     );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_set_attribute(attribute:"plugin_publication_date", value: "2004/09/15");
     script_set_attribute(attribute:"vuln_publication_date", value: "2004/08/31");
     script_set_attribute(attribute:"patch_publication_date", value: "2004/09/14");
     script_cvs_date("Date: 2018/07/16 14:09:15");
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe",value:"cpe:/a:mozilla:mozilla");
     script_set_attribute(attribute:"cpe",value:"cpe:/a:mozilla:firefox");
     script_set_attribute(attribute:"cpe",value:"cpe:/a:mozilla:thunderbird");
     script_set_attribute(attribute:"cpe",value:"cpe:/a:netscape:navigator");
     script_end_attributes();
    
     script_category(ACT_GATHER_INFO);
     script_family(english:"Windows");
     script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
     script_dependencies("mozilla_org_installed.nasl");
     if ( NASL_LEVEL >= 3206 ) script_require_ports("Mozilla/Version", "Mozilla/Firefox/Version");
     exit(0);
    }
    
    #
    
    include("misc_func.inc");
    
    ver = read_version_in_kb("Mozilla/Version");
    if (!isnull(ver))
    {
      if (
        ver[0] < 1 ||
        (
          ver[0] == 1 &&
          (
            ver[1] < 7 ||
            (ver[1] == 7 && ver[2] < 3)
          )
        )
      )  security_hole(get_kb_item("SMB/transport"));
    }
    
    ver = read_version_in_kb("Mozilla/Firefox/Version");
    if (!isnull(ver))
    {
      if (ver[0] == 0 && ver[1] < 10)
        security_hole(get_kb_item("SMB/transport"));
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_AB9C559E115A11D9BC4A000C41E2CDAD.NASL
    descriptionGael Delalleau discovered several integer overflows in Mozilla
    last seen2020-06-01
    modified2020-06-02
    plugin id19074
    published2005-07-13
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/19074
    titleFreeBSD : mozilla -- BMP decoder vulnerabilities (ab9c559e-115a-11d9-bc4a-000c41e2cdad)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2004-107.NASL
    descriptionA number of vulnerabilities were fixed in mozilla 1.7.3, the following of which have been backported to mozilla packages for Mandrakelinux 10.0 : -
    last seen2020-06-01
    modified2020-06-02
    plugin id15521
    published2004-10-20
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15521
    titleMandrake Linux Security Advisory : mozilla (MDKSA-2004:107)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2004-486.NASL
    descriptionUpdated mozilla packages that fix a number of security issues are now available. Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. Jesse Ruderman discovered a cross-domain scripting bug in Mozilla. If a user is tricked into dragging a JavaScript link into another frame or page, it becomes possible for an attacker to steal or modify sensitive information from that site. Additionally, if a user is tricked into dragging two links in sequence to another window (not frame), it is possible for the attacker to execute arbitrary commands. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0905 to this issue. Gael Delalleau discovered an integer overflow which affects the BMP handling code inside Mozilla. An attacker could create a carefully crafted BMP file in such a way that it would cause Mozilla to crash or execute arbitrary code when the image is viewed. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0904 to this issue. Georgi Guninski discovered a stack-based buffer overflow in the vCard display routines. An attacker could create a carefully crafted vCard file in such a way that it would cause Mozilla to crash or execute arbitrary code when viewed. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0903 to this issue. Wladimir Palant discovered a flaw in the way JavaScript interacts with the clipboard. It is possible that an attacker could use malicious JavaScript code to steal sensitive data which has been copied into the clipboard. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0908 to this issue. Georgi Guninski discovered a heap based buffer overflow in the
    last seen2020-06-01
    modified2020-06-02
    plugin id15409
    published2004-10-02
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/15409
    titleRHEL 2.1 / 3 : mozilla (RHSA-2004:486)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200409-26.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200409-26 (Mozilla, Firefox, Thunderbird, Epiphany: New releases fix vulnerabilities) Mozilla-based products are vulnerable to multiple security issues. Firstly, routines handling the display of BMP images and VCards contain an integer overflow and a stack buffer overrun. Specific pages with long links, when sent using the
    last seen2020-06-01
    modified2020-06-02
    plugin id14781
    published2004-09-21
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/14781
    titleGLSA-200409-26 : Mozilla, Firefox, Thunderbird, Epiphany: New releases fix vulnerabilities

Oval

accepted2013-04-29T04:10:14.341-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
    ovaloval:org.mitre.oval:def:11782
  • commentCentOS Linux 3.x
    ovaloval:org.mitre.oval:def:16651
descriptionInteger overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.
familyunix
idoval:org.mitre.oval:def:10952
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleInteger overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.
version27