Lucene search

K
mozillaMozilla FoundationMFSA2008-34
HistoryJul 15, 2008 - 12:00 a.m.

Remote code execution by overflowing CSS reference counter โ€” Mozilla

2008-07-1500:00:00
Mozilla Foundation
www.mozilla.org
18

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.435 Medium

EPSS

Percentile

97.3%

An anonymous researcher, via TippingPointโ€™s Zero Day Initiative program, reported a vulnerability in Mozillaโ€™s internal CSSValue array data structure. The vulnerability was caused by an insufficiently sized variable being used as a reference counter for CSS objects. By creating a very large number of references to a common CSS object, this counter could be overflowed which could cause a crash when the browser attempts to free the CSS object while still in use. An attacker could use this crash to run arbitrary code on the victimโ€™s computer.

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.435 Medium

EPSS

Percentile

97.3%