Lucene search

K
mozillaMozilla FoundationMFSA2008-34
HistoryJul 15, 2008 - 12:00 a.m.

Remote code execution by overflowing CSS reference counter โ€” Mozilla

2008-07-1500:00:00
Mozilla Foundation
www.mozilla.org
25

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.452

Percentile

97.4%

An anonymous researcher, via TippingPointโ€™s Zero Day Initiative program, reported a vulnerability in Mozillaโ€™s internal CSSValue array data structure. The vulnerability was caused by an insufficiently sized variable being used as a reference counter for CSS objects. By creating a very large number of references to a common CSS object, this counter could be overflowed which could cause a crash when the browser attempts to free the CSS object while still in use. An attacker could use this crash to run arbitrary code on the victimโ€™s computer.

Affected configurations

Vulners
Node
mozillafirefoxRange<2.0.0.16
OR
mozillafirefoxRange<3.0.1
OR
mozillaseamonkeyRange<1.1.11
OR
mozillathunderbirdRange<2.0.0.16
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.452

Percentile

97.4%