Skip to main content

Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

Last Update Date: 14 Feb 2012 10:23 Release Date: 14 Feb 2012 5371 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

A vulnerability has been identified in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a use-after-free error in the "nsXBLDocumentInfo::ReadPrototypeBindings()" method when handling XBL bindings in a hash table and can be exploited to cause a cycle collector to call an invalid virtual function.

Successful exploitation may allow execution of arbitrary code.


Impact

  • Remote Code Execution

System / Technologies affected

  • Mozilla Firefox 10.x
  • Mozilla SeaMonkey 2.x
  • Mozilla Thunderbird 10.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link