The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html cve-icon cve-icon
http://secunia.com/advisories/32684 cve-icon cve-icon
http://secunia.com/advisories/32693 cve-icon cve-icon
http://secunia.com/advisories/32694 cve-icon cve-icon
http://secunia.com/advisories/32695 cve-icon cve-icon
http://secunia.com/advisories/32713 cve-icon cve-icon
http://secunia.com/advisories/32714 cve-icon cve-icon
http://secunia.com/advisories/32721 cve-icon cve-icon
http://secunia.com/advisories/32778 cve-icon cve-icon
http://secunia.com/advisories/32845 cve-icon cve-icon
http://secunia.com/advisories/32853 cve-icon cve-icon
http://secunia.com/advisories/33433 cve-icon cve-icon
http://secunia.com/advisories/34501 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 cve-icon cve-icon
http://ubuntu.com/usn/usn-667-1 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1669 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1671 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1697 cve-icon cve-icon
http://www.iss.net/threats/311.html cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:228 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:230 cve-icon cve-icon
http://www.mozilla.org/security/announce/2008/mfsa2008-54.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0977.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0978.html cve-icon cve-icon
http://www.securityfocus.com/bid/32281 cve-icon cve-icon
http://www.securitytracker.com/id?1021185 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA08-319A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/3146 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/0977 cve-icon cve-icon
https://bugzilla.mozilla.org/show_bug.cgi?id=443299 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-0017 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11005 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-0017 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2008-11-13T11:00:00

Updated: 2024-08-07T07:32:23.353Z

Reserved: 2007-12-13T00:00:00

Link: CVE-2008-0017

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-11-13T11:30:01.173

Modified: 2024-11-21T00:40:59.173

Link: CVE-2008-0017

cve-icon Redhat

Severity : Critical

Publid Date: 2008-11-12T00:00:00Z

Links: CVE-2008-0017 - Bugzilla