Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-q5x9-vpfc-fjcq
Vulnerability from github
Published
2022-05-03 03:14
Modified
2022-05-03 03:14
Details
Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.
{ affected: [], aliases: [ "CVE-2005-4134", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2005-12-09T15:03:00Z", severity: "MODERATE", }, details: "Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.", id: "GHSA-q5x9-vpfc-fjcq", modified: "2022-05-03T03:14:37Z", published: "2022-05-03T03:14:37Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-4134", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11382", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1619", }, { type: "WEB", url: "https://usn.ubuntu.com/271-1", }, { type: "WEB", url: "https://usn.ubuntu.com/275-1", }, { type: "WEB", url: "http://marc.info/?l=full-disclosure&m=113404911919629&w=2", }, { type: "WEB", url: "http://marc.info/?l=full-disclosure&m=113405896025702&w=2", }, { type: "WEB", url: "http://secunia.com/advisories/17934", }, { type: "WEB", url: "http://secunia.com/advisories/17944", }, { type: "WEB", url: "http://secunia.com/advisories/17946", }, { type: "WEB", url: "http://secunia.com/advisories/18700", }, { type: "WEB", url: "http://secunia.com/advisories/18704", }, { type: "WEB", url: "http://secunia.com/advisories/18705", }, { type: "WEB", url: "http://secunia.com/advisories/18706", }, { type: "WEB", url: "http://secunia.com/advisories/18708", }, { type: "WEB", url: "http://secunia.com/advisories/18709", }, { type: "WEB", url: "http://secunia.com/advisories/19230", }, { type: "WEB", url: "http://secunia.com/advisories/19746", }, { type: "WEB", url: "http://secunia.com/advisories/19759", }, { type: "WEB", url: "http://secunia.com/advisories/19852", }, { type: "WEB", url: "http://secunia.com/advisories/19862", }, { type: "WEB", url: "http://secunia.com/advisories/19863", }, { type: "WEB", url: "http://secunia.com/advisories/19902", }, { type: "WEB", url: "http://secunia.com/advisories/19941", }, { type: "WEB", url: "http://secunia.com/advisories/21033", }, { type: "WEB", url: "http://secunia.com/advisories/21622", }, { type: "WEB", url: "http://securitytracker.com/id?1015328", }, { type: "WEB", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1", }, { type: "WEB", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1", }, { type: "WEB", url: "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm", }, { type: "WEB", url: "http://www.debian.org/security/2006/dsa-1044", }, { type: "WEB", url: "http://www.debian.org/security/2006/dsa-1046", }, { type: "WEB", url: "http://www.debian.org/security/2006/dsa-1051", }, { type: "WEB", url: "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml", }, { type: "WEB", url: "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml", }, { type: "WEB", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:036", }, { type: "WEB", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:037", }, { type: "WEB", url: "http://www.mozilla.org/security/announce/mfsa2006-03.html", }, { type: "WEB", url: "http://www.mozilla.org/security/history-title.html", }, { type: "WEB", url: "http://www.networksecurity.fi/advisories/netscape-history.html", }, { type: "WEB", url: "http://www.osvdb.org/21533", }, { type: "WEB", url: "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html", }, { type: "WEB", url: "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2006-0199.html", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2006-0200.html", }, { type: "WEB", url: "http://www.securityfocus.com/archive/1/425975/100/0/threaded", }, { type: "WEB", url: "http://www.securityfocus.com/archive/1/425978/100/0/threaded", }, { type: "WEB", url: "http://www.securityfocus.com/archive/1/438730/100/0/threaded", }, { type: "WEB", url: "http://www.securityfocus.com/bid/15773", }, { type: "WEB", url: "http://www.securityfocus.com/bid/16476", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2005/2805", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2006/0413", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2006/3391", }, ], schema_version: "1.4.0", severity: [], }
cve-2005-4134
Vulnerability from cvelistv5
Published
2005-12-09 15:00
Modified
2024-08-07 23:31
Severity ?
EPSS score ?
Summary
Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T23:31:49.153Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "MDKSA-2006:036", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:036", }, { name: "USN-275-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/275-1/", }, { name: "19902", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19902", }, { name: "21533", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/21533", }, { name: "MDKSA-2006:037", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:037", }, { name: "17944", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/17944", }, { name: "HPSBUX02122", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/438730/100/0/threaded", }, { name: "19941", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19941", }, { name: "17946", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/17946", }, { name: "20051208 Re: re: Firefox 1.5 buffer overflow (poc)", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://marc.info/?l=full-disclosure&m=113405896025702&w=2", }, { name: "FEDORA-2006-075", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html", }, { name: "GLSA-200604-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml", }, { name: "21622", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/21622", }, { name: "19862", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19862", }, { name: "19230", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19230", }, { name: "18704", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18704", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.networksecurity.fi/advisories/netscape-history.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm", }, { name: "DSA-1051", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1051", }, { name: "18709", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18709", }, { name: "USN-271-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/271-1/", }, { name: "18705", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18705", }, { name: "GLSA-200604-18", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml", }, { name: "16476", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/16476", }, { name: "ADV-2006-0413", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/0413", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.mozilla.org/security/announce/mfsa2006-03.html", }, { name: "1015328", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1015328", }, { name: "19746", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19746", }, { name: "21033", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/21033", }, { name: "18700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18700", }, { name: "102550", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1", }, { name: "19759", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19759", }, { name: "RHSA-2006:0200", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0200.html", }, { name: "18706", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18706", }, { name: "17934", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/17934", }, { name: "SSRT061158", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/438730/100/0/threaded", }, { name: "15773", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/15773", }, { name: "FEDORA-2006-076", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.mozilla.org/security/history-title.html", }, { name: "RHSA-2006:0199", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0199.html", }, { name: "19863", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19863", }, { name: "FLSA-2006:180036-2", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/425978/100/0/threaded", }, { name: "oval:org.mitre.oval:def:11382", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11382", }, { name: "20060201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { name: "SCOSA-2006.26", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt", }, { name: "18708", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18708", }, { name: "ADV-2005-2805", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2005/2805", }, { name: "FLSA:180036-1", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/425975/100/0/threaded", }, { name: "oval:org.mitre.oval:def:1619", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1619", }, { name: "20051208 re: Firefox 1.5 buffer overflow (poc)", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://marc.info/?l=full-disclosure&m=113404911919629&w=2", }, { name: "228526", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1", }, { name: "19852", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19852", }, { name: "ADV-2006-3391", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/3391", }, { name: "DSA-1046", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1046", }, { name: "DSA-1044", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1044", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-12-08T00:00:00", descriptions: [ { lang: "en", value: "Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-19T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "MDKSA-2006:036", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:036", }, { name: "USN-275-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/275-1/", }, { name: "19902", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19902", }, { name: "21533", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/21533", }, { name: "MDKSA-2006:037", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:037", }, { name: "17944", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/17944", }, { name: "HPSBUX02122", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://www.securityfocus.com/archive/1/438730/100/0/threaded", }, { name: "19941", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19941", }, { name: "17946", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/17946", }, { name: "20051208 Re: re: Firefox 1.5 buffer overflow (poc)", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://marc.info/?l=full-disclosure&m=113405896025702&w=2", }, { name: "FEDORA-2006-075", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html", }, { name: "GLSA-200604-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml", }, { name: "21622", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/21622", }, { name: "19862", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19862", }, { name: "19230", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19230", }, { name: "18704", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18704", }, { tags: [ "x_refsource_MISC", ], url: "http://www.networksecurity.fi/advisories/netscape-history.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm", }, { name: "DSA-1051", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1051", }, { name: "18709", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18709", }, { name: "USN-271-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/271-1/", }, { name: "18705", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18705", }, { name: "GLSA-200604-18", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml", }, { name: "16476", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/16476", }, { name: "ADV-2006-0413", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/0413", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.mozilla.org/security/announce/mfsa2006-03.html", }, { name: "1015328", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1015328", }, { name: "19746", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19746", }, { name: "21033", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/21033", }, { name: "18700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18700", }, { name: "102550", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1", }, { name: "19759", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19759", }, { name: "RHSA-2006:0200", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0200.html", }, { name: "18706", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18706", }, { name: "17934", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/17934", }, { name: "SSRT061158", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://www.securityfocus.com/archive/1/438730/100/0/threaded", }, { name: "15773", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/15773", }, { name: "FEDORA-2006-076", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.mozilla.org/security/history-title.html", }, { name: "RHSA-2006:0199", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0199.html", }, { name: "19863", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19863", }, { name: "FLSA-2006:180036-2", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/archive/1/425978/100/0/threaded", }, { name: "oval:org.mitre.oval:def:11382", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11382", }, { name: "20060201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { name: "SCOSA-2006.26", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt", }, { name: "18708", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18708", }, { name: "ADV-2005-2805", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2005/2805", }, { name: "FLSA:180036-1", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/archive/1/425975/100/0/threaded", }, { name: "oval:org.mitre.oval:def:1619", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1619", }, { name: "20051208 re: Firefox 1.5 buffer overflow (poc)", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://marc.info/?l=full-disclosure&m=113404911919629&w=2", }, { name: "228526", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1", }, { name: "19852", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19852", }, { name: "ADV-2006-3391", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/3391", }, { name: "DSA-1046", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1046", }, { name: "DSA-1044", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1044", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2005-4134", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Also, it has been independently reported that Netscape 8.1 does not have this issue.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "MDKSA-2006:036", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:036", }, { name: "USN-275-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/275-1/", }, { name: "19902", refsource: "SECUNIA", url: "http://secunia.com/advisories/19902", }, { name: "21533", refsource: "OSVDB", url: "http://www.osvdb.org/21533", }, { name: "MDKSA-2006:037", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:037", }, { name: "17944", refsource: "SECUNIA", url: "http://secunia.com/advisories/17944", }, { name: "HPSBUX02122", refsource: "HP", url: "http://www.securityfocus.com/archive/1/438730/100/0/threaded", }, { name: "19941", refsource: "SECUNIA", url: "http://secunia.com/advisories/19941", }, { name: "17946", refsource: "SECUNIA", url: "http://secunia.com/advisories/17946", }, { name: "20051208 Re: re: Firefox 1.5 buffer overflow (poc)", refsource: "FULLDISC", url: "http://marc.info/?l=full-disclosure&m=113405896025702&w=2", }, { name: "FEDORA-2006-075", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html", }, { name: "GLSA-200604-12", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml", }, { name: "21622", refsource: "SECUNIA", url: "http://secunia.com/advisories/21622", }, { name: "19862", refsource: "SECUNIA", url: "http://secunia.com/advisories/19862", }, { name: "19230", refsource: "SECUNIA", url: "http://secunia.com/advisories/19230", }, { name: "18704", refsource: "SECUNIA", url: "http://secunia.com/advisories/18704", }, { name: "http://www.networksecurity.fi/advisories/netscape-history.html", refsource: "MISC", url: "http://www.networksecurity.fi/advisories/netscape-history.html", }, { name: "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm", refsource: "CONFIRM", url: "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm", }, { name: "DSA-1051", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1051", }, { name: "18709", refsource: "SECUNIA", url: "http://secunia.com/advisories/18709", }, { name: "USN-271-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/271-1/", }, { name: "18705", refsource: "SECUNIA", url: "http://secunia.com/advisories/18705", }, { name: "GLSA-200604-18", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml", }, { name: "16476", refsource: "BID", url: "http://www.securityfocus.com/bid/16476", }, { name: "ADV-2006-0413", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/0413", }, { name: "http://www.mozilla.org/security/announce/mfsa2006-03.html", refsource: "CONFIRM", url: "http://www.mozilla.org/security/announce/mfsa2006-03.html", }, { name: "1015328", refsource: "SECTRACK", url: "http://securitytracker.com/id?1015328", }, { name: "19746", refsource: "SECUNIA", url: "http://secunia.com/advisories/19746", }, { name: "21033", refsource: "SECUNIA", url: "http://secunia.com/advisories/21033", }, { name: "18700", refsource: "SECUNIA", url: "http://secunia.com/advisories/18700", }, { name: "102550", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1", }, { name: "19759", refsource: "SECUNIA", url: "http://secunia.com/advisories/19759", }, { name: "RHSA-2006:0200", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2006-0200.html", }, { name: "18706", refsource: "SECUNIA", url: "http://secunia.com/advisories/18706", }, { name: "17934", refsource: "SECUNIA", url: "http://secunia.com/advisories/17934", }, { name: "SSRT061158", refsource: "HP", url: "http://www.securityfocus.com/archive/1/438730/100/0/threaded", }, { name: "15773", refsource: "BID", url: "http://www.securityfocus.com/bid/15773", }, { name: "FEDORA-2006-076", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html", }, { name: "http://www.mozilla.org/security/history-title.html", refsource: "MISC", url: "http://www.mozilla.org/security/history-title.html", }, { name: "RHSA-2006:0199", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2006-0199.html", }, { name: "19863", refsource: "SECUNIA", url: "http://secunia.com/advisories/19863", }, { name: "FLSA-2006:180036-2", refsource: "FEDORA", url: "http://www.securityfocus.com/archive/1/425978/100/0/threaded", }, { name: "oval:org.mitre.oval:def:11382", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11382", }, { name: "20060201-01-U", refsource: "SGI", url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { name: "SCOSA-2006.26", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt", }, { name: "18708", refsource: "SECUNIA", url: "http://secunia.com/advisories/18708", }, { name: "ADV-2005-2805", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2005/2805", }, { name: "FLSA:180036-1", refsource: "FEDORA", url: "http://www.securityfocus.com/archive/1/425975/100/0/threaded", }, { name: "oval:org.mitre.oval:def:1619", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1619", }, { name: "20051208 re: Firefox 1.5 buffer overflow (poc)", refsource: "FULLDISC", url: "http://marc.info/?l=full-disclosure&m=113404911919629&w=2", }, { name: "228526", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1", }, { name: "19852", refsource: "SECUNIA", url: "http://secunia.com/advisories/19852", }, { name: "ADV-2006-3391", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/3391", }, { name: "DSA-1046", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1046", }, { name: "DSA-1044", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1044", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2005-4134", datePublished: "2005-12-09T15:00:00", dateReserved: "2005-12-09T00:00:00", dateUpdated: "2024-08-07T23:31:49.153Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.