Mozilla Products Javascript String Replace Method Buffer Overflow

Strike ID:
E09-5df01
CVSS:
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
False Positive:
f
Variants:
1
Year:
2009

Description

This strike exploits a vulnerability within Mozilla Firefox and Seamonkey. If the javascript String Replace method is passed both arguments that match the substring, and that string contains a '$' character, the replace operation is not performed properly. This causes a large string calculation that results in a buffer overflow.

CVE

Bid