Lucene search

K
mozillaMozilla FoundationMFSA2012-105
HistoryNov 20, 2012 - 12:00 a.m.

Use-after-free and buffer overflow issues found using Address Sanitizer — Mozilla

2012-11-2000:00:00
Mozilla Foundation
www.mozilla.org
24

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.068 Low

EPSS

Percentile

93.9%

Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting five additional use-after-free, out of bounds read, and buffer overflow flaws introduced during Firefox development that were fixed before general release.

Affected configurations

Vulners
Node
mozillafirefoxRange<17
OR
mozillafirefox_esrRange<10.0.11
OR
mozillaseamonkeyRange<2.14
OR
mozillathunderbirdRange<17
OR
mozillathunderbird_esrRange<10.0.11

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.068 Low

EPSS

Percentile

93.9%