Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities
Last Update Date:
11 Dec 2013 10:17
Release Date:
11 Dec 2013
3668
Views
RISK: High Risk
TYPE: Clients - Browsers
Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.
- Some unspecified errors exist, which can be exploited to cause memory corruption.
- An error exists related to inherited character set encoding information, which can be exploited to bypass the cross-site scripting filtering.
- An error exists when handling an <object> element contained within a sandboxed iframe, which can be exploited to bypass sandbox restrictions.
- A use-after-free error exists in the "nsEventListenerManager::HandleEventSubType()" function (nsEventListenerManager.cpp) and "nsNodeUtils::LastRelease()" method (nsNodeUtils.cpp).
- An error exists when inserting an ordered list into a document through script within the "nsGfxScrollFrameInner::IsLTR()" function.
- An error exists when pasting a selection with a middle-click, which can be exploited to disclose data saved to the clipboard.
- An error exists when validating extended validation (EV) certificates, which can lead to the validation of an EV capable root certificate.
- A use-after-free error exists related to synthetic mouse movement in the "DispatchSynthMouseMove()" virtual method and "GetHoverGeneration()" function (RestyleManager.h), which can be exploited to corrupt heap-based memory.
- An error exists when generating GetElementIC typed array stubs outside observed typesets during JavaScript compilation.
- Two errors exist within a bundled vulnerable version of libjpeg.
Impact
- Cross-Site Scripting
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
System / Technologies affected
- Firefox versions prior to 26
- Firefox ESR versions prior to 24.2
- Thunderbird versions prior to 24.2
- SeaMonkey versions prior to 2.23
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to a fixed version.
Vulnerability Identifier
- CVE-2013-5609
- CVE-2013-5610
- CVE-2013-5611
- CVE-2013-5612
- CVE-2013-5613
- CVE-2013-5614
- CVE-2013-5615
- CVE-2013-5616
- CVE-2013-5618
- CVE-2013-5619
- CVE-2013-6629
- CVE-2013-6630
- CVE-2013-6671
- CVE-2013-6672
- CVE-2013-6673
Source
Related Link
Share with