Skip to main content

Mozilla Products HTML Editor Use-After-Free Vulnerability

Last Update Date: 11 Mar 2013 14:11 Release Date: 11 Mar 2013 3692 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

A vulnerability has been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to compromise a user's system.

 
The vulnerability is caused due to a use-after-free error within the HTML editor when content script is run by the "document.execCommand()" function while performing certain internal editing operations. This can be exploited to reference data from already freed memory.

Impact

  • Remote Code Execution

System / Technologies affected

  • Mozilla Firefox 17.x
  • Mozilla Firefox 19.x
  • Mozilla SeaMonkey 2.x
  • Mozilla Thunderbird 17.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to a fixed version.

Vulnerability Identifier


Source


Related Link