The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 1.5.0.3 (including) |
Thunderbird | Mozilla | * | 1.5.0.3 (including) |
Firefox | Ubuntu | dapper | * |
Firefox-granparadiso | Ubuntu | devel | * |
Lightning-sunbird | Ubuntu | devel | * |
Midbrowser | Ubuntu | devel | * |
Mozilla-thunderbird | Ubuntu | dapper | * |
Mozilla-thunderbird | Ubuntu | edgy | * |
Mozilla-thunderbird | Ubuntu | feisty | * |
Xulrunner | Ubuntu | devel | * |
Xulrunner | Ubuntu | edgy | * |
Xulrunner | Ubuntu | feisty | * |
Red Hat Enterprise Linux 3 | RedHat | seamonkey-0:1.0.2-0.1.0.EL3 | * |
Red Hat Enterprise Linux 4 | RedHat | devhelp-0:0.10-0.2.el4 | * |
Red Hat Enterprise Linux 4 | RedHat | seamonkey-0:1.0.3-0.el4.1 | * |
Red Hat Enterprise Linux 4 | RedHat | firefox-0:1.5.0.5-0.el4.1 | * |
Red Hat Enterprise Linux 4 | RedHat | thunderbird-0:1.5.0.5-0.el4.1 | * |
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
Red Hat Enterprise Linux ES version 2.1 | RedHat | * | |
Red Hat Enterprise Linux WS version 2.1 | RedHat | * | |
Red Hat Linux Advanced Workstation 2.1 | RedHat | * |