Skip to main content

Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities

Last Update Date: 6 Feb 2014 15:27 Release Date: 6 Feb 2014 4224 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  1. Errors when handling discarded images within the "RasterImage" class, terminating a web worker running asm.js code after passing an object between threads, and some unspecified errors can be exploited to cause memory corruption.
  2. A use-after-free error related to certain content types when used with the "imgRequestProxy()" function can be exploited to cause memory corruption.
  3. A race condition error when handling session tickets within libssl can be exploited to e.g. cause memory corruption.
  4. An error when handling XML Binding Language (XBL) content scopes can be exploited to bypass System Only Wrappers (SOW) by using XBL content scopes to clone protected XUL elements.
  5. An error related to the "document.caretPositionFromPoint()" and "document.elementFromPoint()" functions can be exploited to bypass the same-origin policy and subsequently e.g. potentially disclose certain attributes of an iframe element.
  6. An error when handling web workers' error messages can be exploited to bypass the same-origin policy and subsequently e.g. disclose otherwise inaccessible information.
  7. An error when handling XSLT stylesheets can be exploited to bypass Content Security Policy (CSP) and subsequently e.g. execute arbitrary script code.
  8. An error when handling JavaScript native getters on window objects can be exploited to e.g. bypass certain unspecified security restrictions.
  9. A weakness exists when handling the dialog for saving downloaded files, which can potentially be exploited to e.g. cause downloaded files to be opened via clickjacking attacks.

Impact

  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • Firefox versions prior to 27 and ESR versions prior to 24.3
  • Thunderbird versions prior to 24.3
  • SeaMonkey versions prior to 2.24

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to a fixed version.

Vulnerability Identifier


Source


Related Link