Vulnerability Name: CVE-2005-4134 (CCN-24432) Assigned: 2005-12-03 Published: 2005-12-03 Updated: 2018-10-19 Summary: Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. Note : despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue. CVSS v3 Severity: 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P )1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Denial of Service References: Source: SCO Type: UNKNOWNSCOSA-2006.26 Source: SGI Type: UNKNOWN20060201-01-U Source: MITRE Type: CNACVE-2005-4134 Source: FULLDISC Type: UNKNOWN20051208 re: Firefox 1.5 buffer overflow (poc) Source: FULLDISC Type: UNKNOWN20051208 Re: re: Firefox 1.5 buffer overflow (poc) Source: CCN Type: RHSA-2006-0199mozilla security update Source: CCN Type: RHSA-2006-0200firefox security update Source: CCN Type: SA17934Mozilla Firefox History Information Denial of Service Weakness Source: SECUNIA Type: Vendor Advisory17934 Source: CCN Type: SA17944Mozilla Suite History Information Denial of Service Weakness Source: SECUNIA Type: Vendor Advisory17944 Source: CCN Type: SA17946Netscape History Information Denial of Service Weakness Source: SECUNIA Type: Vendor Advisory17946 Source: CCN Type: SA18700Firefox Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN18700 Source: CCN Type: SA18704Thunderbird Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN18704 Source: SECUNIA Type: UNKNOWN18705 Source: SECUNIA Type: UNKNOWN18706 Source: SECUNIA Type: UNKNOWN18708 Source: SECUNIA Type: UNKNOWN18709 Source: SECUNIA Type: UNKNOWN19230 Source: SECUNIA Type: UNKNOWN19746 Source: SECUNIA Type: UNKNOWN19759 Source: SECUNIA Type: UNKNOWN19852 Source: SECUNIA Type: UNKNOWN19862 Source: SECUNIA Type: UNKNOWN19863 Source: SECUNIA Type: UNKNOWN19902 Source: SECUNIA Type: UNKNOWN19941 Source: SECUNIA Type: UNKNOWN21033 Source: SECUNIA Type: UNKNOWN21622 Source: CCN Type: SECTRACK ID: 1015328Mozilla Firefox Buffer Overflow in Loading `history.dat` Lets Remote Users Deny Service Source: SECTRACK Type: UNKNOWN1015328 Source: CCN Type: Sun Alert ID: 102550Multiple Security Vulnerabilites in Mozilla 1.4 and 1.7 for Solaris and for Sun JDS for Linux Source: SUNALERT Type: UNKNOWN102550 Source: SUNALERT Type: UNKNOWN228526 Source: CCN Type: ASA-2006-045Mozilla and Firefox security updates (RHSA-2006-0199 RHSA-2006-0200) Source: CONFIRM Type: UNKNOWNhttp://support.avaya.com/elmodocs2/security/ASA-2006-205.htm Source: DEBIAN Type: UNKNOWNDSA-1044 Source: DEBIAN Type: UNKNOWNDSA-1046 Source: DEBIAN Type: UNKNOWNDSA-1051 Source: DEBIAN Type: DSA-1044mozilla-firefox -- several vulnerabilities Source: DEBIAN Type: DSA-1046mozilla -- several vulnerabilities Source: DEBIAN Type: DSA-1051mozilla-thunderbird -- several vulnerabilities Source: CCN Type: GLSA-200604-12Mozilla Firefox: Multiple vulnerabilities Source: GENTOO Type: UNKNOWNGLSA-200604-12 Source: CCN Type: GLSA-200604-18Mozilla Suite: Multiple vulnerabilities Source: GENTOO Type: UNKNOWNGLSA-200604-18 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:036 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:037 Source: CCN Type: MFSA 2006-03Long document title causes startup denial of service Source: CONFIRM Type: UNKNOWNhttp://www.mozilla.org/security/announce/mfsa2006-03.html Source: CCN Type: Mozilla Web siteLong-title temporary startup unresponsiveness Source: MISC Type: UNKNOWNhttp://www.mozilla.org/security/history-title.html Source: CCN Type: Networksecurity.fi Security Advisory (08-12-2005)Netscape/K-Meleon overly long History.dat document.title field Denial of Service vulnerability Source: MISC Type: UNKNOWNhttp://www.networksecurity.fi/advisories/netscape-history.html Source: OSVDB Type: UNKNOWN21533 Source: CCN Type: OSVDB ID: 21533Mozilla Firefox Large History Entry Overflow DoS Source: FEDORA Type: UNKNOWNFEDORA-2006-075 Source: FEDORA Type: UNKNOWNFEDORA-2006-076 Source: REDHAT Type: UNKNOWNRHSA-2006:0199 Source: REDHAT Type: UNKNOWNRHSA-2006:0200 Source: FEDORA Type: UNKNOWNFLSA:180036-1 Source: FEDORA Type: UNKNOWNFLSA-2006:180036-2 Source: HP Type: UNKNOWNHPSBUX02122 Source: BID Type: UNKNOWN15773 Source: CCN Type: BID-15773Mozilla Firefox Large History File Buffer Overflow Vulnerability Source: BID Type: UNKNOWN16476 Source: CCN Type: BID-16476Multiple Mozilla Products Memory Corruption/Code Injection/Access Restriction Bypass Vulnerabilities Source: CCN Type: USN-271-1Firefox vulnerabilities Source: CCN Type: USN-275-1Mozilla vulnerabilities Source: VUPEN Type: UNKNOWNADV-2005-2805 Source: VUPEN Type: UNKNOWNADV-2006-0413 Source: VUPEN Type: UNKNOWNADV-2006-3391 Source: CCN Type: mozilla.org Bugzilla Bug 319004CVE-2005-4134 overlong document.title setting can corrupt history data, causing non-responsive temporary hang (crash?) on subsequent startups Source: XF Type: UNKNOWNbrowser-title-history-dos(24432) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:11382 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:1619 Source: CCN Type: SourceForge.netK-Meleon Source: UBUNTU Type: UNKNOWNUSN-271-1 Source: UBUNTU Type: UNKNOWNUSN-275-1 Vulnerable Configuration: Configuration 1 :cpe:/a:k-meleon_project:k-meleon:0.7:*:*:*:*:*:*:* OR cpe:/a:k-meleon_project:k-meleon:0.7_service_pack_1:*:*:*:*:*:*:* OR cpe:/a:k-meleon_project:k-meleon:0.8:*:*:*:*:*:*:* OR cpe:/a:k-meleon_project:k-meleon:0.8.1:*:*:*:*:*:*:* OR cpe:/a:k-meleon_project:k-meleon:0.8.2:*:*:*:*:*:*:* OR cpe:/a:k-meleon_project:k-meleon:*:*:*:*:*:*:*:* (Version <= 0.9) OR cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version <= 1.5) OR cpe:/a:mozilla:mozilla_suite:*:*:*:*:*:*:*:* (Version <= 1.7.12) OR cpe:/a:netscape:navigator:7.1:*:*:*:*:*:*:* OR cpe:/a:netscape:navigator:7.2:*:*:*:*:*:*:* OR cpe:/a:netscape:navigator:*:*:*:*:*:*:*:* (Version <= 8.0.40) Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1 :cpe:/a:mozilla:firefox:0.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:0.9:rc:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:0.9.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:0.9.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:0.9.3:*:*:*:*:*:*:* OR cpe:/a:netscape:navigator:7.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:0.10.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta1:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.11:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:0.10:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:0.9:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.10:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.12:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:0.7:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:11382 V Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue. 2013-04-29 oval:org.mitre.oval:def:1619 V Mozilla Firefox History File Buffer Overflow 2009-11-09 oval:com.redhat.rhsa:def:20060199 P RHSA-2006:0199: mozilla security update (Critical) 2008-03-20 oval:org.debian:def:1051 V several vulnerabilities 2006-05-04 oval:org.debian:def:1046 V several vulnerabilities 2006-04-27 oval:org.debian:def:1044 V several vulnerabilities 2006-04-26 oval:com.redhat.rhsa:def:20060200 P RHSA-2006:0200: firefox security update (Critical) 2006-02-02
BACK
k-meleon_project k-meleon 0.7
k-meleon_project k-meleon 0.7_service_pack_1
k-meleon_project k-meleon 0.8
k-meleon_project k-meleon 0.8.1
k-meleon_project k-meleon 0.8.2
k-meleon_project k-meleon *
mozilla firefox *
mozilla mozilla suite *
netscape navigator 7.1
netscape navigator 7.2
netscape navigator *
mozilla firefox 0.8
mozilla firefox 0.9 rc
mozilla firefox 0.9.2
mozilla firefox 0.9.1
mozilla firefox 0.9.3
netscape navigator 7.2
mozilla firefox 0.10.1
mozilla firefox 1.0
mozilla mozilla suite 1.7.6
mozilla firefox 1.0.1
mozilla firefox 1.0.2
mozilla firefox 1.0.3
mozilla mozilla suite 1.7.7
mozilla firefox 1.0.4
mozilla mozilla suite 1.7.8
mozilla firefox 1.0.6
mozilla firefox 1.5 beta1
mozilla mozilla suite 1.7.11
mozilla firefox 1.0.7
mozilla firefox 1.5
mozilla firefox 1.0.8
mozilla firefox 0.10
mozilla firefox 0.9
mozilla firefox 1.0.5
mozilla firefox 1.5 beta2
mozilla mozilla suite 1.7.10
mozilla mozilla suite 1.7.12
mozilla firefox 0.7
gentoo linux *
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0