Mozilla Products HTML Editor Use-After-Free Vulnerability
Last Update Date:
11 Mar 2013 14:11
Release Date:
11 Mar 2013
4098
Views
RISK: High Risk
TYPE: Clients - Browsers
A vulnerability has been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a use-after-free error within the HTML editor when content script is run by the "document.execCommand()" function while performing certain internal editing operations. This can be exploited to reference data from already freed memory.
Impact
- Remote Code Execution
System / Technologies affected
- Mozilla Firefox 17.x
- Mozilla Firefox 19.x
- Mozilla SeaMonkey 2.x
- Mozilla Thunderbird 17.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to a fixed version.
Vulnerability Identifier
Source
Related Link
Share with