Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Products 'select()' Denial Of Service Vulnerability (Windows)

Information

Severity

Severity

High

Family

Family

Denial of Service

CVSSv2 Base

CVSSv2 Base

7.1

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

The host is installed with Mozilla Firefox/Seamonkey/Thunderbird and is prone to Denial of Service vulnerability.

Insight

Insight

A null pointer dereference error occurs while calling the 'select' method with a large integer, that results in continuous allocation of x+n bytes of memory exhausting memory after a while.

Affected Software

Affected Software

Seamonkey version prior to 1.1.17 Thunderbird version 2.0.0.22 and prior Firefox version before 2.0.0.19 and 3.x before 3.0.5 on Windows.

Solution

Solution

Upgrade to Firefox version 2.0.0.19 or 3.0.5 or later Upgrade to Seamonkey version 1.1.17 or later Apply patch for Thunderbird through above mozilla engine update.

Common Vulnerabilities and Exposures (CVE)