Bug 512145 (CVE-2009-2470) - CVE-2009-2470 Mozilla data corruption with SOCKS5 reply
Summary: CVE-2009-2470 Mozilla data corruption with SOCKS5 reply
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-2470
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://web.nvd.nist.gov/view/vuln/det...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-07-16 14:27 UTC by Josh Bressers
Modified: 2019-09-29 12:30 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-04-12 22:02:00 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0153 0 normal SHIPPED_LIVE Moderate: thunderbird security update 2010-03-17 12:38:49 UTC
Red Hat Product Errata RHSA-2010:0154 0 normal SHIPPED_LIVE Moderate: thunderbird security update 2010-03-17 13:22:56 UTC

Description Josh Bressers 2009-07-16 14:27:24 UTC
Andrej Andolsek reported that when Firefox receives a reply from a SOCKS5
proxy which contains a DNS name longer than 15 characters, the subsequent
data stream in the response can become corrupted. There was no evidence of
memory corruption, however, and the severity of the issue was determined to
be low.

References:
  [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470
  [2] http://www.mozilla.org/security/announce/2009/mfsa2009-38.html
  [3] https://bugzilla.mozilla.org/show_bug.cgi?id=459524
  [4] http://www.securityfocus.com/bid/35925
  [5] http://www.securitytracker.com/id?1022665
  [6] http://secunia.com/advisories/36126
  [7] http://www.vupen.com/english/advisories/2009/2142
  [8] http://xforce.iss.net/xforce/xfdb/52252

Comment 2 errata-xmlrpc 2010-03-17 12:39:16 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0153 https://rhn.redhat.com/errata/RHSA-2010-0153.html

Comment 3 errata-xmlrpc 2010-03-17 13:25:37 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2010:0154 https://rhn.redhat.com/errata/RHSA-2010-0154.html


Note You need to log in before you can comment on or make changes to this bug.