New Search

Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4 and SeaMonkey 1.0.9 and 1.1.2 allows remote attackers to cause a denial of service via (1) a large cookie path parameter which triggers memory consumption or (2) an internal delimiter within cookie path or name values which could trigger a misinterpretation of cookie data aka "Path Abuse in Cookies."

oval:org.mitre.oval:def:10759

Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4 and SeaMonkey 1.0.9 and 1.1.2 allows remote attackers to cause a denial of service via (1) a large cookie path parameter which triggers memory consumption or (2) an internal delimiter within cookie path or name values which could trigger a misinterpretation of cookie data aka "Path Abuse in Cookies."

Family:
unix
Status:
ACCEPTED
Platform(s):
  • CentOS Linux 4
  • CentOS Linux 3
  • Red Hat Enterprise Linux 5
  • Oracle Linux 5
  • Red Hat Enterprise Linux 3
  • Oracle Linux 4
  • Red Hat Enterprise Linux 4
  • CentOS Linux 5
Class:
vulnerability
Reference(s):
  • CVE-2007-1362
Product(s):