Check Point Advisories

Mozilla Firefox CSS letter-spacing Heap Overflow - Ver2 (CVE-2006-1730)

Check Point Reference: CPAI-2014-1257
Date Published: 31 Mar 2014
Severity: Medium
Last Updated: Monday 31 March, 2014
Source: CVE-2006-1730
Industry Reference:CVE-2006-1730
Protection Provided by:

Security Gateway
R77, R76, R75

Who is Vulnerable?
Vulnerability Description The Firefox web browser is an application designed for tasks related to browsing the web, such as displaying HTML encoded pages, downloading files, and so forth. This application has a built-in JavaScript interpreter. It is also capable of using Cascading Style Sheets (CSS). There exists a heap based buffer overflow vulnerability in Mozilla Firefox as well as other Mozilla products. The vulnerability is caused due to an integer overflow leading to an insufficient buffer allocation while rendering the CSS spacing. A malicious attacker can exploit this vulnerability by enticing a user to open a specially crafted web page, which may result in the injection and execution of arbitrary code on the target host. The target application may terminate or lock up as a result of an attack attempt when a code execution attack attempt is unsuccessful. All pages open in the targeted application will be inaccessible. An attack which results in successful code execution may divert the flow of the process to an arbitrary location. In such a case, the behaviour of the target host is dependent on the intention of the injected code. Any code execution will be within the privileges of the currently logged in user.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.

For information on how to update IPS, go to

SBP-2006-05
,
Protection tab and select the version of your choice.

Security Gateway R77 / R76 / R75 / R71 / R70

  1. In the IPS tab, click Protections and find the Mozilla Firefox CSS letter-spacing Heap Overflow - Ver2 protection using the Search tool and Edit the protection's settings.
  2. Install policy on all modules.

SmartView Tracker will log the following entries:

Attack Name:  Web Client Enforcement Violation.
Attack Information:  Mozilla Firefox CSS letter-spacing Heap Overflow - Ver2

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK