Description
Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.
Product(s):
- Mozilla Firefox 0.8
- Mozilla Firefox 0.9.1
- Mozilla Firefox 0.9.2
- Mozilla Firefox 0.9.3
- Mozilla Firefox 0.9
- Mozilla Firefox 0.9 rc
- Mozilla Mozilla 1.7.1
- Mozilla Mozilla 1.7.2
- Mozilla Mozilla 1.7
- Mozilla Mozilla 1.7 alpha
- Mozilla Mozilla 1.7 beta
- Mozilla Mozilla 1.7 rc1
- Mozilla Mozilla 1.7 rc2
- Mozilla Mozilla 1.7 rc3
- Mozilla Thunderbird 0.6
- Mozilla Thunderbird 0.7.1
- Mozilla Thunderbird 0.7.2
- Mozilla Thunderbird 0.7.3
- Mozilla Thunderbird 0.7
- Mozilla Thunderbird 0.7 Release Candidate
- Netscape Navigator 7.0.2
- Netscape Navigator 7.0
- Netscape Navigator 7.1
- Netscape Navigator 7.2
- Conectiva Linux 10.0
- Conectiva Linux 9.0
- Red Hat Enterprise Linux 2.1 Advanced Server
- Red Hat Enterprise Linux 2.1 Advanced Server IA64
- Red Hat Enterprise Linux 2.1 Enterprise Server
- Red Hat Enterprise Linux 2.1 Enterprise Server IA64
- Red Hat Enterprise Linux 2.1 Workstation
- Red Hat Enterprise Linux 2.1 Workstation IA64
- Red Hat Enterprise Linux 3.0 Advanced Server Edition
- Red Hat Enterprise Linux 3.0 Enterprise Server Edition
- Red Hat Enterprise Linux 3.0 Workstation Server Edition
- Red Hat Desktop 3.0
- Red Hat Fedora Core Core 1.0
- Red Hat Linux 7.3
- Red Hat Linux 7.3 on I386
- Red Hat Linux 7.3 on i686
- Red Hat Linux 9.0 on i386
- Red Hat Linux Advanced Workstation 2.1 on IA64
- Red Hat Linux Advanced Workstation 2.1 on Itanium Processor
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-0904, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-0904 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.