Description
Mozilla Firefox 1.0.7 and earlier on Linux allows remote attackers to cause a denial of service (client crash) via an IFRAME element with a large value of the WIDTH attribute, which triggers a problem related to representation of floating-point numbers, leading to an infinite loop of widget resizes and a corresponding large number of function calls on the stack.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Tom Ferris · textdosmultiple
https://www.exploit-db.com/exploits/26325
References (6)
Core 6
Core References
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015011
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15015
Exploit, Vendor Advisory x_refsource_misc
http://www.security-protocols.com/advisory/sp-x19-advisory.txt
Issue Tracking x_refsource_confirm
https://bugzilla.mozilla.org/show_bug.cgi?id=303433
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17071
Exploit, Vendor Advisory x_refsource_misc
http://security-protocols.com/modules.php?name=News&file=article&sid=2978
Scores
EPSS
0.1266
EPSS Percentile
94.0%
Details
Status
published
Products (2)
mozilla/firefox
1.0.6
mozilla/firefox
1.0.7
Published
Dec 31, 2005
Tracked Since
Feb 18, 2026