Lucene search

K
mozillaMozilla FoundationMFSA2011-04
HistoryMar 01, 2011 - 12:00 a.m.

Buffer overflow in JavaScript upvarMap — Mozilla

2011-03-0100:00:00
Mozilla Foundation
www.mozilla.org
18

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.199

Percentile

96.3%

Security researcher Christian Holler reported that the JavaScript engine’s internal memory mapping of non-local JS variables contained a buffer overflow which could potentially be used by an attacker to run arbitrary code on a victim’s computer.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.17
OR
mozillafirefoxRange<3.6.14
OR
mozillaseamonkeyRange<2.0.12
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.199

Percentile

96.3%