Overview
There is a buffer overflow vulnerability in the Mozilla "send page" feature that could allow a remote attacker to execute arbitrary code.
Description
| Mozilla is an open-source web browser, email/newsgroup client, IRC client, and HTML editor available for a number of platforms including Microsoft Windows, Linux, and other UNIX platforms. The email client provides a "send page" feature that allows users to easily attach a web page to an email message and forward that page to a specified email address. There is a vulnerability in the way the "send page" feature handles overly long URLs that could trigger a buffer overflow condition. | 
Impact
| By convincing a user to send a specially crafted URL using the "send page" feature, an attacker could execute arbitrary code with privileges of the vulnerable process. | 
Solution
| Upgrade Upgrade as specified by your vendor. This issue has been resolved in Mozilla 1.7.3, Firefox Preview Release, and Thunderbird 0.8. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was reported by Georgi Guninski.
This document was written by Damon Morda.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 5.74 | 
| Date Public: | 2004-09-04 | 
| Date First Published: | 2004-09-17 | 
| Date Last Updated: | 2004-09-17 18:08 UTC | 
| Document Revision: | 13 |