Lucene search

K
mozillaMozilla FoundationMFSA2009-13
HistoryMar 27, 2009 - 12:00 a.m.

Arbitrary code execution via XUL tree element — Mozilla

2009-03-2700:00:00
Mozilla Foundation
www.mozilla.org
12

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.91 High

EPSS

Percentile

98.8%

Security researcher Nils reported via TippingPoint’s Zero Day Initiative that the XUL tree method _moveToEdgeShift was in some cases triggering garbage collection routines on objects which were still in use. In such cases, the browser would crash when attempting to access a previously destroyed object and this crash could be used by an attacker to run arbitrary code on a victim’s computer.

CPENameOperatorVersion
firefoxlt3.0.8

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.91 High

EPSS

Percentile

98.8%