Lucene search

K
certCERTVU:652366
HistoryAug 01, 2005 - 12:00 a.m.

Mozilla insecurely clones objects and member functions

2005-08-0100:00:00
www.kb.cert.org
16

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.162 Low

EPSS

Percentile

95.9%

Overview

Mozilla fails to enforce security restrictions on cloned base objects. This may allow a remote attacker to execute arbitrary code on a vulnerable web browser.

Description

Mozilla supports the use of JavaScript to perform client side scripting. JavaScript uses prototyping as a way to dynamically inherit methods and properties from a superclass. The methods and properties are inherited at runtime via the .prototype property of a subclass. A class hierarchy defined using prototyping is known as a prototype chain.

Mozilla insecurely clones base objects in a prototype chain causing an access control vulnerability. A remote attacker with control of an object with few privileges may be able to access methods and properties stored in more privileged base objects higher up the prototype chain.

Note that this vulnerability may exist in all Mozilla-based web browsers, including Netscape and Firefox.


Impact

A remote attacker may be able to traverse the prototype chain to access privileged objects. Once access is gained, the attacker may be able to execute arbitrary code with elevated privileges.


Solution

Upgrade

This vulnerability is fixed in Firefox 1.0.5 and Mozilla Suite 1.7.10.


Vendor Information

652366

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Mozilla, Inc. __ Affected

Updated: August 01, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

<http://www.mozilla.org/security/announce/mfsa2005-56.html&gt;

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23652366 Feedback>).

Netscape Communications Corporation Affected

Updated: August 01, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Red Hat Software, Inc. __ Affected

Updated: August 15, 2005

Status

Affected

Vendor Statement

Updated Mozilla packages (for Red Hat Enterprise Linux 4, 3, and 2.1) and updated Firefox and Thunderbird packages (for Red Hat Enterprise Linux 4) to correct this issue are available at the URL below and by using the Red Hat Network ‘up2date’ tool.

<http://rhn.redhat.com/errata/CAN-2005-2270.html&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by The Mozilla Foundation. The Mozilla Foundation credits moz_bug_r_a4 and shutdown for reporting this issue.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-2270
Severity Metric: 7.80 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.162 Low

EPSS

Percentile

95.9%