Description
Integer overflow in the SOAPParameter object constructor in (1) Netscape version 7.0 and 7.1 and (2) Mozilla 1.6, and possibly earlier versions, allows remote attackers to execute arbitrary code.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by zen-parse · textdoslinux
https://www.exploit-db.com/exploits/24346
References (9)
Core 9
Core References
Various Sources vendor-advisory
x_refsource_sco
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
Various Sources x_refsource_misc
http://www.idefense.com/application/poi/display?id=117&type=vulnerabilities
Vendor Advisory vendor-advisory
x_refsource_suse
http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2004-421.html
Issue Tracking x_refsource_confirm
http://bugzilla.mozilla.org/show_bug.cgi?id=236618
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9378
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15495
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16862
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4629
Scores
EPSS
0.2311
EPSS Percentile
96.0%
Details
Status
published
Products (3)
mozilla/mozilla
1.6
netscape/navigator
7.0
netscape/navigator
7.1
Published
Aug 18, 2004
Tracked Since
Feb 18, 2026