Description
Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.
Published: 2005-12-09
Score: 5.0 Medium
EPSS: 27.7% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1044-1 New Mozilla Firefox packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1046-1 New Mozilla packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1051-1 New Mozilla Thunderbird packages fix several vulnerabilities
Ubuntu USN Ubuntu USN USN-271-1 Firefox vulnerabilities
Ubuntu USN Ubuntu USN USN-275-1 Mozilla vulnerabilities
References
Link Providers
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt cve-icon cve-icon
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U cve-icon cve-icon
http://marc.info/?l=full-disclosure&m=113404911919629&w=2 cve-icon cve-icon
http://marc.info/?l=full-disclosure&m=113405896025702&w=2 cve-icon cve-icon
http://secunia.com/advisories/17934 cve-icon cve-icon
http://secunia.com/advisories/17944 cve-icon cve-icon
http://secunia.com/advisories/17946 cve-icon cve-icon
http://secunia.com/advisories/18700 cve-icon cve-icon
http://secunia.com/advisories/18704 cve-icon cve-icon
http://secunia.com/advisories/18705 cve-icon cve-icon
http://secunia.com/advisories/18706 cve-icon cve-icon
http://secunia.com/advisories/18708 cve-icon cve-icon
http://secunia.com/advisories/18709 cve-icon cve-icon
http://secunia.com/advisories/19230 cve-icon cve-icon
http://secunia.com/advisories/19746 cve-icon cve-icon
http://secunia.com/advisories/19759 cve-icon cve-icon
http://secunia.com/advisories/19852 cve-icon cve-icon
http://secunia.com/advisories/19862 cve-icon cve-icon
http://secunia.com/advisories/19863 cve-icon cve-icon
http://secunia.com/advisories/19902 cve-icon cve-icon
http://secunia.com/advisories/19941 cve-icon cve-icon
http://secunia.com/advisories/21033 cve-icon cve-icon
http://secunia.com/advisories/21622 cve-icon cve-icon
http://securitytracker.com/id?1015328 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1044 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1046 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1051 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:036 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:037 cve-icon cve-icon
http://www.mozilla.org/security/announce/mfsa2006-03.html cve-icon cve-icon
http://www.mozilla.org/security/history-title.html cve-icon cve-icon
http://www.networksecurity.fi/advisories/netscape-history.html cve-icon cve-icon
http://www.osvdb.org/21533 cve-icon cve-icon
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html cve-icon cve-icon
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0199.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0200.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/425975/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/425978/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/438730/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/15773 cve-icon cve-icon
http://www.securityfocus.com/bid/16476 cve-icon cve-icon
http://www.vupen.com/english/advisories/2005/2805 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0413 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3391 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2005-4134 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11382 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1619 cve-icon cve-icon
https://usn.ubuntu.com/271-1/ cve-icon cve-icon
https://usn.ubuntu.com/275-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2005-4134 cve-icon
History

No history.

Subscriptions

K-meleon Project K-meleon
Mozilla Firefox Mozilla Suite
Netscape Navigator
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T23:31:49.153Z

Reserved: 2005-12-09T00:00:00.000Z

Link: CVE-2005-4134

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2005-12-09T15:03:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2005-4134

cve-icon Redhat

Severity : Moderate

Publid Date: 2005-12-03T00:00:00Z

Links: CVE-2005-4134 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses