Lucene search

K
mozillaMozilla FoundationMFSA2008-49
HistoryNov 12, 2008 - 12:00 a.m.

Arbitrary code execution via Flash Player dynamic module unloading — Mozilla

2008-11-1200:00:00
Mozilla Foundation
www.mozilla.org
7

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.454 Medium

EPSS

Percentile

97.4%

An anonymous security researcher reported via TippingPoint’s Zero Day Initiative that insufficient checks were being performed to test whether the Flash module was properly dynamically unloaded. The researcher demonstrated that a SWF file which dynamically unloads itself from an outside JavaScript function can cause the browser to access a memory address no longer mapped to the Flash module, resulting in a crash. This crash could be used by an attacker to run arbitrary code on a victim’s computer.

CPENameOperatorVersion
firefoxlt2.0.0.18
seamonkeylt1.1.13

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.454 Medium

EPSS

Percentile

97.4%