Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability
RISK: High Risk
TYPE: Clients - Browsers
A vulnerability has been identified in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a use-after-free error in the "nsXBLDocumentInfo::ReadPrototypeBindings()" method when handling XBL bindings in a hash table and can be exploited to cause a cycle collector to call an invalid virtual function.
Successful exploitation may allow execution of arbitrary code.
Impact
- Remote Code Execution
System / Technologies affected
- Mozilla Firefox 10.x
- Mozilla SeaMonkey 2.x
- Mozilla Thunderbird 10.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update Firefox and Thunderbird to version 10.0.1 and SeaMonkey to version 2.7.1
http://www.mozilla.com/en-US/firefox/
Vulnerability Identifier
Source
Related Link
Share with