Lucene search

K
mozillaMozilla FoundationMFSA2011-41
HistorySep 27, 2011 - 12:00 a.m.

Potentially exploitable WebGL crashes — Mozilla

2011-09-2700:00:00
Mozilla Foundation
www.mozilla.org
17

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.022

Percentile

89.6%

Michael Jordon of Context IS reported that in the ANGLE library used by WebGL the return value from GrowAtomTable() was not checked for errors. If an attacker could cause requests that exceeded the available memeory those would fail and potentially lead to a buffer overrun as subsequent code wrote into the non-allocated space.

Affected configurations

Vulners
Node
mozillafirefoxRange<7
OR
mozillaseamonkeyRange<2.4

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.022

Percentile

89.6%