Lucene search

K
mozillaMozilla FoundationMFSA2011-03
HistoryMar 01, 2011 - 12:00 a.m.

Use-after-free error in JSON.stringify — Mozilla

2011-03-0100:00:00
Mozilla Foundation
www.mozilla.org
21

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.108

Percentile

95.2%

Security researcher regenrecht reported via TippingPoint’s Zero Day Initiative that a method used by JSON.stringify contained a use-after-free error in which a currently in-use pointer was freed and subsequently dereferenced. This could lead to arbitrary code execution if an attacker was able to store malicious code in the freed section of memory.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.17
OR
mozillafirefoxRange<3.6.14
OR
mozillaseamonkeyRange<2.0.12
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.108

Percentile

95.2%