Mozilla Products Multiple Vulnerabilities
Last Update Date:
3 Mar 2011 10:59
Release Date:
3 Mar 2011
6338
Views
RISK: High Risk
TYPE: Clients - Browsers
Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.
- Due to memory corruption errors in the browser engine when parsing malformed data, which could be exploited by attackers to crash a vulnerable browser or execute arbitrary code.
- Due to an error when handling a recursive call to "eval()" wrapped in a try or catch statement, which could be exploited to force a user into accepting any dialog (e.g. to grant elevated privileges to a malicious web page).
- Due to a user-after-free error related to a method used by "JSON.stringify", which could allow attackers to execute arbitrary code.
- Due to a buffer overflow error related to the JavaScript engine's internal memory mapping of non-local JS variables, which could allow attackers to execute arbitrary code.
- Due to a buffer overflow error related to the JavaScript engine's internal memory mapping of string values, which could allow attackers to execute arbitrary code.
- Due to a use-after-free error related to Web Workers, which could allow attackers to execute arbitrary code.
- Due to a memory corruption error during text run construction, which could allow attackers to execute arbitrary code.
- Due to an error in the "ParanoidFragmentSink" class that allows "javascript:" URLs and inline JavaScript when the embedding document is a chrome document, which could allow code injection via an affected extension.
- Due to a buffer overflow error when decoding JPEG images, which could allow attackers to execute arbitrary code.
- Due to an error when plugin-initiated requests receive a 307 redirect response, which could allow cross-site request forgery attacks.
Impact
- Cross-Site Scripting
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Mozilla Firefox versions prior to 3.6.14
- Mozilla Firefox versions prior to 3.5.17
- Mozilla Thunderbird versions prior to 3.1.8
- Mozilla SeaMonkey versions prior to 2.0.12
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to Mozilla Firefox version 3.6.14 or 3.5.17 :
- Upgrade to Mozilla Thunderbird version 3.1.8 :
- Upgrade to Mozilla SeaMonkey version 2.0.12 :
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with