Lucene search

K
mozillaMozilla FoundationMFSA2009-08
HistoryMar 04, 2009 - 12:00 a.m.

Mozilla Firefox XUL Linked Clones Double Free Vulnerability — Mozilla

2009-03-0400:00:00
Mozilla Foundation
www.mozilla.org
11

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.175 Low

EPSS

Percentile

96.1%

An anonymous researcher, via TippingPoint’s Zero Day Initiative program, reported a vulnerability in Mozilla’s garbage collection process. The vulnerability was caused by improper memory management of a set of cloned XUL DOM elements which were linked as a parent and child. After reloading the browser on a page with such linked elements, the browser would crash when attempting to access an object which was already destroyed. An attacker could use this crash to run arbitrary code on the victim’s computer.

CPENameOperatorVersion
firefoxlt3.0.7

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.175 Low

EPSS

Percentile

96.1%