Upstream information
Description
Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| National Vulnerability Database | |
|---|---|
| Base Score | 7.5 | 
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P | 
| Access Vector | Network | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | Partial | 
| Integrity Impact | Partial | 
| Availability Impact | Partial | 
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 01:54:27 2013CVE page last modified: Fri Oct 7 12:45:31 2022