Lucene search

K
mozillaMozilla FoundationMFSA2010-67
HistoryOct 19, 2010 - 12:00 a.m.

Dangling pointer vulnerability in LookupGetterOrSetter β€” Mozilla

2010-10-1900:00:00
Mozilla Foundation
www.mozilla.org
30

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.694

Percentile

98.0%

Security researcher regenrecht reported via TippingPoint’s Zero Day Initiative that when window.lookupGetter is called with no arguments the code assumes the top JavaScript stack value is a property name. Since there were no arguments passed into the function, the top value could represent uninitialized memory or a pointer to a previously freed JavaScript object. Under such circumstances the value is passed to another subroutine which calls through the dangling pointer, potentially executing attacker-controlled memory.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.14
OR
mozillafirefoxRange<3.6.11
OR
mozillaseamonkeyRange<2.0.9
OR
mozillathunderbirdRange<3.0.9
OR
mozillathunderbirdRange<3.1.5
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.694

Percentile

98.0%