Executive Summary

Informations
Name CVE-2005-4134 First vendor Publication 2005-12-09
Vendor Cve Last vendor Modification 2018-10-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11382
 
Oval ID: oval:org.mitre.oval:def:11382
Title: Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.
Description: Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.
Family: unix Class: vulnerability
Reference(s): CVE-2005-4134
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1619
 
Oval ID: oval:org.mitre.oval:def:1619
Title: Mozilla Firefox History File Buffer Overflow
Description: Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.
Family: windows Class: vulnerability
Reference(s): CVE-2005-4134
Version: 4
Platform(s): Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): mozilla
Mozilla Firefox
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5
Application 42
Application 7
Application 31

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200604-12 (mozilla-firefox)
File : nvt/glsa_200604_12.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200604-18 (mozilla)
File : nvt/glsa_200604_18.nasl
2008-01-17 Name : Debian Security Advisory DSA 1044-1 (mozilla-firefox)
File : nvt/deb_1044_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1046-1 (mozilla)
File : nvt/deb_1046_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1051-1 (mozilla-thunderbird)
File : nvt/deb_1051_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
22892 Mozilla Multiple Products Web Page Title Processing Overflow DoS

21533 Multiple Browser Large History Entry DoS

Nessus® Vulnerability Scanner

Date Description
2007-12-21 Name : A web browser on the remote host is prone to multiple flaws.
File : mozilla_firefox_108.nasl - Type : ACT_GATHER_INFO
2007-02-18 Name : The remote host is missing Sun Security Patch number 120671-08
File : solaris9_120671.nasl - Type : ACT_GATHER_INFO
2007-02-18 Name : The remote host is missing Sun Security Patch number 120671-08
File : solaris8_120671.nasl - Type : ACT_GATHER_INFO
2006-12-06 Name : The remote host is missing Sun Security Patch number 120672-08
File : solaris9_x86_120672.nasl - Type : ACT_GATHER_INFO
2006-12-06 Name : The remote host is missing Sun Security Patch number 120672-08
File : solaris8_x86_120672.nasl - Type : ACT_GATHER_INFO
2006-11-06 Name : The remote host is missing Sun Security Patch number 119116-35
File : solaris10_x86_119116.nasl - Type : ACT_GATHER_INFO
2006-11-06 Name : The remote host is missing Sun Security Patch number 119115-36
File : solaris10_119115.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1044.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1046.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1051.nasl - Type : ACT_GATHER_INFO
2006-07-05 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2006-0200.nasl - Type : ACT_GATHER_INFO
2006-07-03 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0199.nasl - Type : ACT_GATHER_INFO
2006-05-03 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200604-18.nasl - Type : ACT_GATHER_INFO
2006-04-28 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-275-1.nasl - Type : ACT_GATHER_INFO
2006-04-26 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200604-12.nasl - Type : ACT_GATHER_INFO
2006-04-21 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-271-1.nasl - Type : ACT_GATHER_INFO
2006-02-10 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-037.nasl - Type : ACT_GATHER_INFO
2006-02-05 Name : A web browser on the remote host is prone to multiple flaws.
File : seamonkey_10.nasl - Type : ACT_GATHER_INFO
2006-02-05 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2006-0200.nasl - Type : ACT_GATHER_INFO
2006-02-05 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0199.nasl - Type : ACT_GATHER_INFO
2006-02-05 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-076.nasl - Type : ACT_GATHER_INFO
2006-02-05 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-075.nasl - Type : ACT_GATHER_INFO
2006-02-04 Name : A web browser on the remote host is prone to multiple flaws.
File : mozilla_firefox_1501.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/15773
http://www.securityfocus.com/bid/16476
CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm
http://www.mozilla.org/security/announce/mfsa2006-03.html
DEBIAN http://www.debian.org/security/2006/dsa-1044
http://www.debian.org/security/2006/dsa-1046
http://www.debian.org/security/2006/dsa-1051
FEDORA http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html
http://www.securityfocus.com/archive/1/425975/100/0/threaded
http://www.securityfocus.com/archive/1/425978/100/0/threaded
FULLDISC http://marc.info/?l=full-disclosure&m=113404911919629&w=2
http://marc.info/?l=full-disclosure&m=113405896025702&w=2
GENTOO http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml
HP http://www.securityfocus.com/archive/1/438730/100/0/threaded
MANDRIVA http://www.mandriva.com/security/advisories?name=MDKSA-2006:036
http://www.mandriva.com/security/advisories?name=MDKSA-2006:037
MISC http://www.mozilla.org/security/history-title.html
http://www.networksecurity.fi/advisories/netscape-history.html
OSVDB http://www.osvdb.org/21533
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2006-0199.html
http://www.redhat.com/support/errata/RHSA-2006-0200.html
SCO ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt
SECTRACK http://securitytracker.com/id?1015328
SECUNIA http://secunia.com/advisories/17934
http://secunia.com/advisories/17944
http://secunia.com/advisories/17946
http://secunia.com/advisories/18700
http://secunia.com/advisories/18704
http://secunia.com/advisories/18705
http://secunia.com/advisories/18706
http://secunia.com/advisories/18708
http://secunia.com/advisories/18709
http://secunia.com/advisories/19230
http://secunia.com/advisories/19746
http://secunia.com/advisories/19759
http://secunia.com/advisories/19852
http://secunia.com/advisories/19862
http://secunia.com/advisories/19863
http://secunia.com/advisories/19902
http://secunia.com/advisories/19941
http://secunia.com/advisories/21033
http://secunia.com/advisories/21622
SGI ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1
UBUNTU https://usn.ubuntu.com/271-1/
https://usn.ubuntu.com/275-1/
VUPEN http://www.vupen.com/english/advisories/2005/2805
http://www.vupen.com/english/advisories/2006/0413
http://www.vupen.com/english/advisories/2006/3391

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
Date Informations
2024-02-10 01:03:22
  • Multiple Updates
2024-02-02 01:03:32
  • Multiple Updates
2024-02-01 12:01:48
  • Multiple Updates
2023-09-05 12:03:19
  • Multiple Updates
2023-09-05 01:01:39
  • Multiple Updates
2023-09-02 12:03:21
  • Multiple Updates
2023-09-02 01:01:39
  • Multiple Updates
2023-08-12 12:03:56
  • Multiple Updates
2023-08-12 01:01:40
  • Multiple Updates
2023-08-11 12:03:26
  • Multiple Updates
2023-08-11 01:01:42
  • Multiple Updates
2023-08-06 12:03:14
  • Multiple Updates
2023-08-06 01:01:40
  • Multiple Updates
2023-08-04 12:03:17
  • Multiple Updates
2023-08-04 01:01:41
  • Multiple Updates
2023-07-14 12:03:16
  • Multiple Updates
2023-07-14 01:01:41
  • Multiple Updates
2023-03-29 01:03:28
  • Multiple Updates
2023-03-28 12:01:46
  • Multiple Updates
2022-10-11 12:02:55
  • Multiple Updates
2022-10-11 01:01:33
  • Multiple Updates
2021-05-05 01:02:05
  • Multiple Updates
2021-05-04 12:03:25
  • Multiple Updates
2021-04-22 01:03:42
  • Multiple Updates
2020-10-14 01:01:40
  • Multiple Updates
2020-10-03 01:01:40
  • Multiple Updates
2020-05-29 01:01:35
  • Multiple Updates
2020-05-23 01:37:06
  • Multiple Updates
2020-05-23 00:17:05
  • Multiple Updates
2018-10-19 21:19:42
  • Multiple Updates
2018-10-05 09:19:22
  • Multiple Updates
2018-10-04 00:19:26
  • Multiple Updates
2017-10-11 09:23:36
  • Multiple Updates
2016-10-18 12:01:51
  • Multiple Updates
2016-06-28 15:27:56
  • Multiple Updates
2016-04-26 14:02:05
  • Multiple Updates
2014-02-17 10:33:48
  • Multiple Updates
2013-05-11 11:36:27
  • Multiple Updates