Advisory Details

April 17th, 2006

Mozilla Firefox Tag Parsing Code Execution Vulnerability

ZDI-06-009
ZDI-CAN-008

CVE ID CVE-2006-0749
CVSS SCORE
AFFECTED VENDORS Mozilla Firefox
AFFECTED PRODUCTS 1.0.x
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['3977']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Mozilla/Firefox web browser and Thunderbird e-mail client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious e-mail.

The specific flaw exists within nsHTMLContentSink.cpp, during the parsing of HTML tags as they appear in a specific order. The flaw results in a memory corruption that leads to an attacker controlled function pointer dereference from the stack and eventually execution of arbitrary code.

ADDITIONAL DETAILS Mozilla Firefox has issued an update to correct this vulnerability. More details can be found at:
http://www.mozilla.org/security/announce/2006/mfsa2006-18.html
DISCLOSURE TIMELINE
  • 2005-12-13 - Vulnerability reported to vendor
  • 2006-04-17 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES