Mozilla.Products.JavaScript.Regular.Expression.Heap.Corruption

description-logoDescription

This indicates an attack attempt to exploit a denial of service vulnerability in Mozilla products including Mozilla Firefox, Thunderbird and SeaMonkey.
It's caused by improper handling of a regular expression ending with a backslash in an unterminated character set. A remote attacker could exploit this vulnerability to cause a victim's browser to crash by persuading the victim to visit a malicious web page.

affected-products-logoAffected Products

Apple Computer, Inc.: Mac OS X Any version
Data General: DG/UX Any version
Gentoo Technologies, Inc.: Gentoo Linux Any version
Hewlett-Packard Company: HP-UX Any version
Hewlett-Packard Company: Tru64 UNIX Any version
IBM: AIX Any version
IBM: OS/2 Any version
Linux: Linux Any version
Microsoft Corporation: Windows 95
Microsoft Corporation: Windows 98
Microsoft Corporation: Windows 98 Second Edition
Microsoft Corporation: Windows Me
Microsoft Corporation: Windows XP
Microsoft Corporation: Windows 2000 Any version
Microsoft Corporation: Windows 2003 Any version
Microsoft Corporation: Windows NT 4.0
Mozilla Foundation: Firefox prior to 1.5.0.7
Mozilla Foundation: SeaMonkey prior to 1.0.5
Mozilla Foundation: Thunderbird prior to 1.5.0.7
Red Hat, Inc.: Red Hat Advanced Workstation 2.1 Itanium
Red Hat, Inc.: Red Hat Desktop 3
Red hat, Inc.: Red Hat Desktop 4
Red Hat, Inc.: Red Hat Enterprise Linux AS Any version
Red Hat, Inc.: Red Hat Enterprise Linux ES Any Version
Red Hat, Inc.: Red Hat Enterprise Linux WS Any Version
Santa Cruz Operation, Inc.: SCO Unix Any version
SGI: IRIX Any version
Sun Microsystems, Inc.: Solaris Any version
Wind River Systems, Inc.: BSD Any version

Impact logoImpact

Denial of Service: Remote attackers can crash vulnerable systems.

recomended-action-logoRecommended Actions

For Red Hat Linux 4 (Firefox):
Refer to Red Hat Linux Security Advisory RHSA-2006:0675-5 for patch, upgrade, or suggested workaround information.
For Red Hat Linux (Seamonkey):
Refer to Red Hat Linux Security Advisory RHSA-2006:0676-10 for patch, upgrade, or suggested workaround information.
For Red Hat Linux 4 (Thunderbird):
Refer to Red Hat Linux Security Advisory RHSA-2006:0677-5 for patch, upgrade, or suggested workaround information.
For Gentoo Linux (Firefox):
Refer to Gentoo Linux Security Announcement GLSA 200609-19 for patch, upgrade, or suggested workaround information.
For Gentoo Linux (Thunderbird):
Refer to Gentoo Linux Security Announcement GLSA 200610-01 for patch, upgrade, or suggested workaround information.
For Gentoo Linux (Seamonkey):
Refer to Gentoo Linux Security Announcement GLSA 200610-04 for patch, upgrade, or suggested workaround information.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-10-12 16.941 Name:Mozilla.
Regular.
Heap.
Corruption:Mozilla.
Products.
JavaScript.
Regular.
Expression.
Heap.
Corruption