Vulnerability Name:

CVE-2005-4134 (CCN-24432)

Assigned:2005-12-03
Published:2005-12-03
Updated:2018-10-19
Summary:Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup.
Note: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: SCO
Type: UNKNOWN
SCOSA-2006.26

Source: SGI
Type: UNKNOWN
20060201-01-U

Source: MITRE
Type: CNA
CVE-2005-4134

Source: FULLDISC
Type: UNKNOWN
20051208 re: Firefox 1.5 buffer overflow (poc)

Source: FULLDISC
Type: UNKNOWN
20051208 Re: re: Firefox 1.5 buffer overflow (poc)

Source: CCN
Type: RHSA-2006-0199
mozilla security update

Source: CCN
Type: RHSA-2006-0200
firefox security update

Source: CCN
Type: SA17934
Mozilla Firefox History Information Denial of Service Weakness

Source: SECUNIA
Type: Vendor Advisory
17934

Source: CCN
Type: SA17944
Mozilla Suite History Information Denial of Service Weakness

Source: SECUNIA
Type: Vendor Advisory
17944

Source: CCN
Type: SA17946
Netscape History Information Denial of Service Weakness

Source: SECUNIA
Type: Vendor Advisory
17946

Source: CCN
Type: SA18700
Firefox Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
18700

Source: CCN
Type: SA18704
Thunderbird Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
18704

Source: SECUNIA
Type: UNKNOWN
18705

Source: SECUNIA
Type: UNKNOWN
18706

Source: SECUNIA
Type: UNKNOWN
18708

Source: SECUNIA
Type: UNKNOWN
18709

Source: SECUNIA
Type: UNKNOWN
19230

Source: SECUNIA
Type: UNKNOWN
19746

Source: SECUNIA
Type: UNKNOWN
19759

Source: SECUNIA
Type: UNKNOWN
19852

Source: SECUNIA
Type: UNKNOWN
19862

Source: SECUNIA
Type: UNKNOWN
19863

Source: SECUNIA
Type: UNKNOWN
19902

Source: SECUNIA
Type: UNKNOWN
19941

Source: SECUNIA
Type: UNKNOWN
21033

Source: SECUNIA
Type: UNKNOWN
21622

Source: CCN
Type: SECTRACK ID: 1015328
Mozilla Firefox Buffer Overflow in Loading `history.dat` Lets Remote Users Deny Service

Source: SECTRACK
Type: UNKNOWN
1015328

Source: CCN
Type: Sun Alert ID: 102550
Multiple Security Vulnerabilites in Mozilla 1.4 and 1.7 for Solaris and for Sun JDS for Linux

Source: SUNALERT
Type: UNKNOWN
102550

Source: SUNALERT
Type: UNKNOWN
228526

Source: CCN
Type: ASA-2006-045
Mozilla and Firefox security updates (RHSA-2006-0199 RHSA-2006-0200)

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm

Source: DEBIAN
Type: UNKNOWN
DSA-1044

Source: DEBIAN
Type: UNKNOWN
DSA-1046

Source: DEBIAN
Type: UNKNOWN
DSA-1051

Source: DEBIAN
Type: DSA-1044
mozilla-firefox -- several vulnerabilities

Source: DEBIAN
Type: DSA-1046
mozilla -- several vulnerabilities

Source: DEBIAN
Type: DSA-1051
mozilla-thunderbird -- several vulnerabilities

Source: CCN
Type: GLSA-200604-12
Mozilla Firefox: Multiple vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-200604-12

Source: CCN
Type: GLSA-200604-18
Mozilla Suite: Multiple vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-200604-18

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:036

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:037

Source: CCN
Type: MFSA 2006-03
Long document title causes startup denial of service

Source: CONFIRM
Type: UNKNOWN
http://www.mozilla.org/security/announce/mfsa2006-03.html

Source: CCN
Type: Mozilla Web site
Long-title temporary startup unresponsiveness

Source: MISC
Type: UNKNOWN
http://www.mozilla.org/security/history-title.html

Source: CCN
Type: Networksecurity.fi Security Advisory (08-12-2005)
Netscape/K-Meleon overly long History.dat document.title field Denial of Service vulnerability

Source: MISC
Type: UNKNOWN
http://www.networksecurity.fi/advisories/netscape-history.html

Source: OSVDB
Type: UNKNOWN
21533

Source: CCN
Type: OSVDB ID: 21533
Mozilla Firefox Large History Entry Overflow DoS

Source: FEDORA
Type: UNKNOWN
FEDORA-2006-075

Source: FEDORA
Type: UNKNOWN
FEDORA-2006-076

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0199

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0200

Source: FEDORA
Type: UNKNOWN
FLSA:180036-1

Source: FEDORA
Type: UNKNOWN
FLSA-2006:180036-2

Source: HP
Type: UNKNOWN
HPSBUX02122

Source: BID
Type: UNKNOWN
15773

Source: CCN
Type: BID-15773
Mozilla Firefox Large History File Buffer Overflow Vulnerability

Source: BID
Type: UNKNOWN
16476

Source: CCN
Type: BID-16476
Multiple Mozilla Products Memory Corruption/Code Injection/Access Restriction Bypass Vulnerabilities

Source: CCN
Type: USN-271-1
Firefox vulnerabilities

Source: CCN
Type: USN-275-1
Mozilla vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2005-2805

Source: VUPEN
Type: UNKNOWN
ADV-2006-0413

Source: VUPEN
Type: UNKNOWN
ADV-2006-3391

Source: CCN
Type: mozilla.org Bugzilla Bug 319004
CVE-2005-4134 overlong document.title setting can corrupt history data, causing non-responsive temporary hang (crash?) on subsequent startups

Source: XF
Type: UNKNOWN
browser-title-history-dos(24432)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11382

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1619

Source: CCN
Type: SourceForge.net
K-Meleon

Source: UBUNTU
Type: UNKNOWN
USN-271-1

Source: UBUNTU
Type: UNKNOWN
USN-275-1

Vulnerable Configuration:Configuration 1:
  • cpe:/a:k-meleon_project:k-meleon:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:k-meleon_project:k-meleon:0.7_service_pack_1:*:*:*:*:*:*:*
  • OR cpe:/a:k-meleon_project:k-meleon:0.8:*:*:*:*:*:*:*
  • OR cpe:/a:k-meleon_project:k-meleon:0.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:k-meleon_project:k-meleon:0.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:k-meleon_project:k-meleon:*:*:*:*:*:*:*:* (Version <= 0.9)
  • OR cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version <= 1.5)
  • OR cpe:/a:mozilla:mozilla_suite:*:*:*:*:*:*:*:* (Version <= 1.7.12)
  • OR cpe:/a:netscape:navigator:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:netscape:navigator:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:netscape:navigator:*:*:*:*:*:*:*:* (Version <= 8.0.40)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mozilla:firefox:0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:0.9:rc:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:netscape:navigator:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:mozilla_suite:1.7.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:mozilla_suite:1.7.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:mozilla_suite:1.7.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
  • OR cpe:/a:mozilla:mozilla_suite:1.7.11:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:0.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
  • OR cpe:/a:mozilla:mozilla_suite:1.7.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:mozilla_suite:1.7.12:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:0.7:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:11382
    V
    Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.
    2013-04-29
    oval:org.mitre.oval:def:1619
    V
    Mozilla Firefox History File Buffer Overflow
    2009-11-09
    oval:com.redhat.rhsa:def:20060199
    P
    RHSA-2006:0199: mozilla security update (Critical)
    2008-03-20
    oval:org.debian:def:1051
    V
    several vulnerabilities
    2006-05-04
    oval:org.debian:def:1046
    V
    several vulnerabilities
    2006-04-27
    oval:org.debian:def:1044
    V
    several vulnerabilities
    2006-04-26
    oval:com.redhat.rhsa:def:20060200
    P
    RHSA-2006:0200: firefox security update (Critical)
    2006-02-02
    BACK
    k-meleon_project k-meleon 0.7
    k-meleon_project k-meleon 0.7_service_pack_1
    k-meleon_project k-meleon 0.8
    k-meleon_project k-meleon 0.8.1
    k-meleon_project k-meleon 0.8.2
    k-meleon_project k-meleon *
    mozilla firefox *
    mozilla mozilla suite *
    netscape navigator 7.1
    netscape navigator 7.2
    netscape navigator *
    mozilla firefox 0.8
    mozilla firefox 0.9 rc
    mozilla firefox 0.9.2
    mozilla firefox 0.9.1
    mozilla firefox 0.9.3
    netscape navigator 7.2
    mozilla firefox 0.10.1
    mozilla firefox 1.0
    mozilla mozilla suite 1.7.6
    mozilla firefox 1.0.1
    mozilla firefox 1.0.2
    mozilla firefox 1.0.3
    mozilla mozilla suite 1.7.7
    mozilla firefox 1.0.4
    mozilla mozilla suite 1.7.8
    mozilla firefox 1.0.6
    mozilla firefox 1.5 beta1
    mozilla mozilla suite 1.7.11
    mozilla firefox 1.0.7
    mozilla firefox 1.5
    mozilla firefox 1.0.8
    mozilla firefox 0.10
    mozilla firefox 0.9
    mozilla firefox 1.0.5
    mozilla firefox 1.5 beta2
    mozilla mozilla suite 1.7.10
    mozilla mozilla suite 1.7.12
    mozilla firefox 0.7
    gentoo linux *
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux corporate server 3.0