Executive Summary

Informations
Name CVE-2004-1316 First vendor Publication 2004-12-29
Vendor Cve Last vendor Modification 2018-05-03

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1316

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:100052
 
Oval ID: oval:org.mitre.oval:def:100052
Title: Mozilla Malicious news: Vulnerability
Description: Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.
Family: windows Class: vulnerability
Reference(s): CVE-2004-1316
Version: 5
Platform(s): Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): mozilla
Mozilla Thunderbird
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9808
 
Oval ID: oval:org.mitre.oval:def:9808
Title: Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.
Description: Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.
Family: unix Class: vulnerability
Reference(s): CVE-2004-1316
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 22

OpenVAS Exploits

Date Description
2009-05-05 Name : HP-UX Update for Mozilla remote HPSBUX01133
File : nvt/gb_hp_ux_HPSBUX01133.nasl
2008-09-04 Name : mozilla -- heap overflow in NNTP handler
File : nvt/freebsd_de-netscape7.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
12637 Mozilla nsNNTPProtocol.cpp NNTP news:// URI Handling Overflow DoS

Mozilla contains a flaw that may allow a malicious user to crash the application. The issue is triggered when a user sends a specially crafted, overly long "news://" URI. causing a buffer overflow within the 'MSG_UnEscapeSearchUrl()' function within "nsNNTPProtocol.cpp" occurs. It is possible that the flaw may allow an attacker to crash mozilla resulting in a loss of availability.

Snort® IPS/IDS

Date Description
2014-01-10 Mozilla NNTP URL Handling Buffer Overflow attempt
RuleID : 17482 - Revision : 13 - Type : BROWSER-FIREFOX

Nessus® Vulnerability Scanner

Date Description
2005-07-13 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_3fbf9db2658b11d9abad000a95bc6fae.nasl - Type : ACT_GATHER_INFO
2005-03-25 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2005-335.nasl - Type : ACT_GATHER_INFO
2005-01-13 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2005-038.nasl - Type : ACT_GATHER_INFO
2005-01-02 Name : A web browser on the remote host is prone to a heap overflow attack.
File : mozilla_nntp_heap_overflow.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/12131
BUGTRAQ http://marc.info/?l=bugtraq&m=110436284718949&w=2
CONFIRM http://www.mozilla.org/security/announce/mfsa2005-06.html
HP http://marc.info/?l=bugtraq&m=110780717916478&w=2
MISC http://isec.pl/vulnerabilities/isec-0020-mozilla.txt
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2005-038.html
SECUNIA http://secunia.com/advisories/19823
SUSE http://www.novell.com/linux/security/advisories/2006_04_25.html
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/18711

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2021-05-04 12:02:29
  • Multiple Updates
2021-04-22 01:02:40
  • Multiple Updates
2020-05-23 00:15:59
  • Multiple Updates
2018-05-03 09:19:26
  • Multiple Updates
2017-07-11 12:01:35
  • Multiple Updates
2016-10-18 12:01:25
  • Multiple Updates
2016-04-26 12:57:58
  • Multiple Updates
2014-02-17 10:28:40
  • Multiple Updates
2014-01-19 21:22:22
  • Multiple Updates
2013-05-11 11:44:44
  • Multiple Updates