Lucene search

K
mozillaMozilla FoundationMFSA2012-85
HistoryOct 09, 2012 - 12:00 a.m.

Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer — Mozilla

2012-10-0900:00:00
Mozilla Foundation
www.mozilla.org
27

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.713 High

EPSS

Percentile

98.1%

Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series of use-after-free, buffer overflow, and out of bounds read issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting two additional use-after-free flaws introduced during Firefox 16 development and fixed before general release.

Affected configurations

Vulners
Node
mozillafirefoxRange<16
OR
mozillafirefox_esrRange<10.0.8
OR
mozillaseamonkeyRange<2.13
OR
mozillathunderbirdRange<16
OR
mozillathunderbird_esrRange<10.0.8

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.713 High

EPSS

Percentile

98.1%