Mozilla Products Multiple Vulnerabilities
Last Update Date:
22 Dec 2011 12:22
Release Date:
22 Dec 2011
5437
Views
RISK: High Risk
TYPE: Clients - Browsers
Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose sensitive information and compromise a user's system.
- Some unspecified errors can be exploited to corrupt memory.
- An error exists within the YARR regular expression library when parsing javascript content.
- An error within the SVG implementation when SVG elements are removed during a DOMAttrModified event can be exploited to cause an out-of-bounds memory access.
- The application does not properly handle SVG animation accessKey events when JavaScript is disabled. This can lead to the user's key strokes being leaked.
- An error within the plugin handler when deleting DOM frame can be exploited to dereference memory. (NOTE: only Mac OS X is affected)
- An error exists within the handling of OGG <video> elements.
Impact
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- Mozilla Firefox 8.x
- Mozilla Thunderbird 8.x
- Mozilla SeaMonkey 2.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to Firefox version 9.0.1 and Thunderbird version 9.0, and update to SeaMonkey version 2.6.
Vulnerability Identifier
Source
Related Link
Share with