Lucene search

K
mozillaMozilla FoundationMFSA2010-75
HistoryDec 09, 2010 - 12:00 a.m.

Buffer overflow while line breaking after document.write with long string — Mozilla

2010-12-0900:00:00
Mozilla Foundation
www.mozilla.org
11

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.2

Percentile

96.4%

Dirk Heinrich reported that on Windows platforms when document.write() was called with a very long string a buffer overflow was caused in line breaking routines attempting to process the string for display. Such cases triggered an invalid read past the end of an array causing a crash which an attacker could potentially use to run arbitrary code on a victim’s computer.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.16
OR
mozillafirefoxRange<3.6.13
OR
mozillaseamonkeyRange<2.0.11
OR
mozillathunderbirdRange<3.0.11
OR
mozillathunderbirdRange<3.1.7
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.2

Percentile

96.4%