Lucene search

K
zdiRegenrechtZDI-11-159
HistoryMay 10, 2011 - 12:00 a.m.

Mozilla Firefox OBJECT mObserverList Remote Code Execution Vulnerability

2011-05-1000:00:00
regenrecht
www.zerodayinitiative.com
19

EPSS

0.107

Percentile

95.1%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within Firefox’s handling of observer OBJECTs. If an observer OBJECT is removed from the mObserverList during an iteration of LOOP_OVER_OBSERVERS macro, one can heap spray over |mObserverList.mNext| andchange the execution flow. This would allow the attacker to execute arbitrary code under the context of the user running the browser.