An integer overflow vulnerability has been reported for the Netscape/Mozilla POP3 mail handler routines. Reportedly, insufficient checks are performed on some server-supplied values. An attacker may exploit this vulnerability through an attacker-controlled POP3 server. By issuing a very large integer value that is used by the Netscape/Mozilla POP3 mail handler, it may be possible to cause the integer overflow condition and allocate a buffer that is too small. Successful exploitation of this vulnerability may allow an attacker to obtain control over the execution of the vulnerable Netscape/Mozilla process.
An integer overflow vulnerability has been reported for the Netscape/Mozilla POP3 mail handler routines. Reportedly, insufficient checks are performed on some server-supplied values. An attacker may exploit this vulnerability through an attacker-controlled POP3 server. By issuing a very large integer value that is used by the Netscape/Mozilla POP3 mail handler, it may be possible to cause the integer overflow condition and allocate a buffer that is too small. Successful exploitation of this vulnerability may allow an attacker to obtain control over the execution of the vulnerable Netscape/Mozilla process.