Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Mozilla SOAPParameter Integer Overlow


Vulnerability Assessment Details

Mozilla SOAPParameter Integer Overlow

Vulnerability Assessment Summary
Acertains the version of Mozilla

Detailed Explanation for this Vulnerability Assessment

The remote host is using Mozilla an alternative web browser.

The remote version of this software is vulnerable to an integer overflow
in the SOAPParameter object constructor. A possible hacker may exploit this flow
to corrupt the process memory and possibly to execute arbitrary code on
the remote host.

To exploit this flaw, a possible hacker would need to set up a rogue website
and lure a victim on the remote host into visiting it.

Solution : Upgrade to Mozilla 1.7.1
Network Security Threat Level: High

Networks Security ID: 10843

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2006 Tenable Network Security

Cables, Connectors

Intel CPU Celeron Dual Core G530 2.40 GHZ LGA1155, AVIA w/track number
$2.99
Intel CPU Celeron Dual Core G530 2.40 GHZ LGA1155, AVIA w/track number  pictureHP DV7 DV7-4000 laptop motherboard 605496-001 AMD CPU DC Brushless Fan As-Is
$20.0
HP DV7 DV7-4000 laptop motherboard 605496-001 AMD CPU DC Brushless Fan As-Is pictureToshiba C55T-A5222/ Intel Celeron 1.9GHz/4GB RAM/200GB HDD HD Touch Screen
$195.0
Toshiba C55T-A5222/ Intel Celeron 1.9GHz/4GB RAM/200GB HDD HD Touch Screen pictureIntel Core T1350 SL99T 1.86/2M/533 Socket M Mobile CPU Processor
$18.5
Intel Core T1350 SL99T 1.86/2M/533 Socket M Mobile CPU Processor picture


Discussions

No Discussions have been posted on this vulnerability.