Check Point Reference: | CPAI-2014-1257 |
Date Published: | 31 Mar 2014 |
Severity: | Medium |
Last Updated: | Monday 31 March, 2014 |
Source: | CVE-2006-1730 |
Industry Reference: | CVE-2006-1730 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | The Firefox web browser is an application designed for tasks related to browsing the web, such as displaying HTML encoded pages, downloading files, and so forth. This application has a built-in JavaScript interpreter. It is also capable of using Cascading Style Sheets (CSS). There exists a heap based buffer overflow vulnerability in Mozilla Firefox as well as other Mozilla products. The vulnerability is caused due to an integer overflow leading to an insufficient buffer allocation while rendering the CSS spacing. A malicious attacker can exploit this vulnerability by enticing a user to open a specially crafted web page, which may result in the injection and execution of arbitrary code on the target host. The target application may terminate or lock up as a result of an attack attempt when a code execution attack attempt is unsuccessful. All pages open in the targeted application will be inaccessible. An attack which results in successful code execution may divert the flow of the process to an arbitrary location. In such a case, the behaviour of the target host is dependent on the intention of the injected code. Any code execution will be within the privileges of the currently logged in user. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.
For information on how to update IPS, go to
SBP-2006-05,
Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Web Client Enforcement Violation.
Attack Information: Mozilla Firefox CSS letter-spacing Heap Overflow - Ver2