Skip to main content

Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities

Last Update Date: 11 Dec 2013 10:17 Release Date: 11 Dec 2013 3120 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  1. Some unspecified errors exist, which can be exploited to cause memory corruption.
  2. An error exists related to inherited character set encoding information, which can be exploited to bypass the cross-site scripting filtering.
  3. An error exists when handling an <object> element contained within a sandboxed iframe, which can be exploited to bypass sandbox restrictions.
  4. A use-after-free error exists in the "nsEventListenerManager::HandleEventSubType()" function (nsEventListenerManager.cpp) and "nsNodeUtils::LastRelease()" method (nsNodeUtils.cpp).
  5. An error exists when inserting an ordered list into a document through script within the "nsGfxScrollFrameInner::IsLTR()" function.
  6. An error exists when pasting a selection with a middle-click, which can be exploited to disclose data saved to the clipboard.
  7. An error exists when validating extended validation (EV) certificates, which can lead to the validation of an EV capable root certificate.
  8. A use-after-free error exists related to synthetic mouse movement in the "DispatchSynthMouseMove()" virtual method and "GetHoverGeneration()" function (RestyleManager.h), which can be exploited to corrupt heap-based memory.
  9. An error exists when generating GetElementIC typed array stubs outside observed typesets during JavaScript compilation.
  10. Two errors exist within a bundled vulnerable version of libjpeg.

Impact

  • Cross-Site Scripting
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure

System / Technologies affected

  • Firefox versions prior to 26
  • Firefox ESR versions prior to 24.2
  • Thunderbird versions prior to 24.2
  • SeaMonkey versions prior to 2.23

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to a fixed version.

Vulnerability Identifier


Source


Related Link