Skip to main content

Mozilla Products Multiple Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 24 Jun 2010 5480 Views

RISK: Medium Risk

Multiple vulnerabilitieshave been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.

1. Due to memory corruption errors in the browser and JavaScript engines when parsing malformed data, which could be exploited by attackers to crash a vulnerable browser or execute arbitrary code.

2. Due to a use-after-free error in "nsCycleCollector::MarkRoots()", which could be exploited by attackers to crash a vulnerable browser or execute arbitrary code.

3. Due to a user-after-free error when two plugin instances interact, which could be exploited by attackers to crash a vulnerable browser or execute arbitrary code.

4. Due to an integer overflow error in "nsGenericDOMDataNode::SetTextInternal", which could be exploited by attackers to crash a vulnerable browser or execute arbitrary code.

5. Due to an integer overflow error in an XSLT node sorting routine, which could be exploited by attackers to crash a vulnerable browser or execute arbitrary code.

6. Due to an error related to the use of "focus()" calls, which could be exploited to inject or steal keystrokes.

7. Due to the "Content-Disposition:" attachment HTTP header being ignored when "Content-Type:" multipart was also present, which could allow cross site scripting attacks against certain web sites.

8. Due to an error when seeding the pseudo-random number generator, which could allow user tracking across sites using "Math.random()".