Vulnerability CVE-2010-1028


Published: 2010-03-19   Modified: 2012-02-13

Description:
Integer overflow in the decompression functionality in the Web Open Fonts Format (WOFF) decoder in Mozilla Firefox 3.6 before 3.6.2 and 3.7 before 3.7 alpha 3 allows remote attackers to execute arbitrary code via a crafted WOFF file that triggers a buffer overflow, as demonstrated by the vd_ff module in VulnDisco 9.0.

See advisories in our WLB2 database:
Topic
Author
Date
High
Mozilla Firefox 3.6 Integer Overflow Exploit
x90c
19.08.2013

Type:

CWE-189

(Numeric Errors)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Mozilla -> Firefox 

 References:
http://www.kb.cert.org/vuls/id/964549
https://forum.immunityinc.com/board/thread/1161/vulndisco-9-0/
https://bugzilla.mozilla.org/show_bug.cgi?id=552216
http://www.mozilla.org/security/announce/2010/mfsa2010-08.html
http://www.h-online.com/security/news/item/Zero-day-exploit-for-Firefox-3-6-936124.html
http://secunia.com/community/forum/thread/show/3592
http://secunia.com/advisories/38608
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7969
http://blog.psi2.de/en/2010/02/20/going-commercial-with-firefox-vulnerabilities/
http://blog.mozilla.com/security/2010/03/18/update-on-secunia-advisory-sa38608/
http://blog.mozilla.com/security/2010/02/22/secunia-advisory-sa38608/

Copyright 2024, cxsecurity.com

 

Back to Top