Description
Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-181-1 | Mozilla products vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T22:53:29.438Z
Reserved: 2005-09-09T00:00:00.000Z
Link: CVE-2005-2871
No data.
Status : Modified
Published: 2005-09-09T18:03:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2005-2871
OpenCVE Enrichment
No data.
Weaknesses
Ubuntu USN