Lucene search

K
mozillaMozilla FoundationMFSA2010-57
HistorySep 07, 2010 - 12:00 a.m.

Crash and remote code execution in normalizeDocument — Mozilla

2010-09-0700:00:00
Mozilla Foundation
www.mozilla.org
29

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.667

Percentile

98.0%

Security researcher regenrecht reported via TippingPoint’s Zero Day Initiative that code used to normalize a document contained a logical flaw that could be leveraged to run arbitrary code. When the normalization code ran, a static count of the document’s child nodes was used in the traversal, so a page could be constructed that would remove DOM nodes during this normalization which could lead to the accessing of a deleted object and potentially the execution of attacker-controlled memory.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.12
OR
mozillafirefoxRange<3.6.9
OR
mozillaseamonkeyRange<2.0.7
OR
mozillathunderbirdRange<3.0.7
OR
mozillathunderbirdRange<3.1.3
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.667

Percentile

98.0%