Lucene search

K
mozillaMozilla FoundationMFSA2010-02
HistoryFeb 17, 2010 - 12:00 a.m.

Web Worker Array Handling Heap Corruption Vulnerability — Mozilla

2010-02-1700:00:00
Mozilla Foundation
www.mozilla.org
21

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.367

Percentile

97.2%

Security researcher Orlando Barrera II of SecTheory reported, via TippingPoint’s Zero Day Initiative, that Mozilla’s implementation of Web Workers contained an error in its handling of array data types when processing posted messages. This error could be used by an attacker to corrupt heap memory and crash the browser, potentially running arbitrary code on a victim’s computer.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.8
OR
mozillafirefoxRange<3.6
OR
mozillaseamonkeyRange<2.0.3
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.367

Percentile

97.2%