Lucene search

K
mozillaMozilla FoundationMFSA2013-12
HistoryJan 08, 2013 - 12:00 a.m.

Buffer overflow in Javascript string concatenation — Mozilla

2013-01-0800:00:00
Mozilla Foundation
www.mozilla.org
34

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.068

Percentile

93.9%

Security researcher pa_kt reported a flaw via TippingPoint’s Zero Day Initiative that an integer overflow is possible when calculating the length for a Javascript string concatenation, which is then used for memory allocation. This results in a buffer overflow, leading to a potentially exploitable memory corruption.

Affected configurations

Vulners
Node
mozillafirefoxRange<18
OR
mozillafirefox_esrRange<10.0.12
OR
mozillafirefox_esrRange<17.0.2
OR
mozillaseamonkeyRange<2.15
OR
mozillathunderbirdRange<17.0.2
OR
mozillathunderbird_esrRange<10.0.12
OR
mozillathunderbird_esrRange<17.0.2
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillafirefox_esr*cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
mozillathunderbird_esr*cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.068

Percentile

93.9%