Skip to main content

Mozilla Products Memory Corruption and Security Bypass Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 23 Jul 2009 5264 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnerable system.

1. Memory corruption errors in the JavaScript and browser engines when parsing malformed data, which could be exploited by attackers to crash a vulnerable application or execute arbitrary code.

2. A memory corruption error when decoding certain data in Base64, which could be exploited to crash an affected application or execute arbitrary code.

3. A memory corruption error when processing multiple RDFs in XUL tree, which could be exploited to crash an affected application or execute arbitrary code.

4. A memory corruption error within a double frame construction, which could be exploited to crash an affected application or execute arbitrary code.

5. A memory corruption error when unloading the the Flash plugin, which could be exploited to crash an affected application or execute arbitrary code.

6. Heap and integer overflow errors in multiple font glyph rendering libraries, which could be exploited to crash an affected application or execute arbitrary code.

7. A memory corruption error when handling a SVG element on which a watch function and __defineSetter__ function have been set for a particular property, which could be exploited to crash an affected application or execute arbitrary code.

8. Due to "setTimeout", when called with certain object parameters which should be protected with a XPCNativeWrapper, failing to keep the object wrapped when compiling the new function to be executed, which could allow attackers to run arbitrary JavaScript with chrome privileges.

9 . Certain objects that normally receive a XPCCrossOriginWrapper are constructed without the wrapper, which could allow cross-domain scripting attacks.