[NEWS] Gecko Based Browsers CSS Letter-Spacing Integer Overflow



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Gecko Based Browsers CSS Letter-Spacing Integer Overflow
------------------------------------------------------------------------


SUMMARY

Letter-spacing is a css property that specifies the spacing behavior
between text characters.

Improper handling of an integer number allows attackers to execute
arbitrary code by using the CSS property of Letter-Spacing with Gecko
based browsers.

DETAILS

Vulnerable Systems:
* Firefox version 1.5 and above
* Firefox version 1.5.0.1 and prior
* Firefox version 1.0 and above 1.0.7
* Firefox version 1.0 and above
* Firefox version 1.0.7 and prior
* Thunderbird version 1.5 and above
* Thunderbird version 1.5.0.1
* Thunderbird version 1.0 and above
* Thunderbird version 1.0.7 and prior
* SeaMonkey version 1.0
* Mozilla Suite version 1.7 and above
* Mozilla Suite version 1.7.12 and prior

The specific flaw is due to incorrect handling of the CSS "letter-spacing"
element. By specifying a large number, an attacker can overflow an integer
used during memory allocation. The under-allocated buffer is later used to
store user-supplied data leading to an exploitable heap overflow.

The overflow condition itself does not require JavaScript and thus could
affect Thunderbird via received mail, but without scripting to prepare
memory it may not be possible to exploit this condition in mail.

This vulnerability allows attackers to execute arbitrary code on
vulnerable installations of the Mozilla/Firefox web browser. User
interaction is required to exploit this vulnerability in that the target
must visit a malicious page.

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730>
CVE-2006-1730

Disclosure Timeline:
2006.01.31 - Vulnerability reported to vendor
2006.01.31 - Digital Vaccine released to TippingPoint customers
2006.04.13 - Coordinated public release of advisory


ADDITIONAL INFORMATION

The information has been provided by <mailto:zdi-disclosures@xxxxxxxx>
zdi disclosures.
The original article can be found at:
<http://www.zerodayinitiative.com/advisories/ZDI-06-010.html>
http://www.zerodayinitiative.com/advisories/ZDI-06-010.html
The vendor advisory can be found at:
<http://www.mozilla.org/security/announce/2006/mfsa2006-22.html>
http://www.mozilla.org/security/announce/2006/mfsa2006-22.html



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NEWS] Mozilla Thunderbird MIME External-Body Heap Overflow Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Mozilla Thunderbird MIME External-Body Heap Overflow Vulnerability ... Thunderbird could allow an attacker to execute arbitrary code with the ...
    (Securiteam)
  • Sicherheistupdates fuer Mozilla-Produkte
    ... | Mozilla Foundation stopft Sicherheitslücken in Mozilla, Firefox ... | Mozilla Firefox CSS Letter-Spacing Heap Overflow Vulnerability ... | Thunderbird e-mail client. ...
    (microsoft.public.de.security.heimanwender)
  • [NEWS] Firefox Same-Domain Bypass Vulnerability (NULL Character)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Firefox Same-Domain Bypass Vulnerability ... cookies for *.example.com; he'll be also able to alter document.domain ...
    (Securiteam)
  • [NEWS] Gecko Table Rebuilding Code Execution
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Firefox version 1.5.0.1 and prior ... Thunderbird version 1.5.0.1 and prior ... The vulnerability allow attackers to execute arbitrary code on vulnerable ...
    (Securiteam)
  • [EXPL] Firefox createRange Crash (Exploit)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Mozilla Firefox is a free, open source, ... vulnerability. ...
    (Securiteam)