Lucene search

K
mozillaMozilla FoundationMFSA2011-22
HistoryJun 21, 2011 - 12:00 a.m.

Integer overflow and arbitrary code execution in Array.reduceRight() β€” Mozilla

2011-06-2100:00:00
Mozilla Foundation
www.mozilla.org
21

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.957 High

EPSS

Percentile

99.4%

Security researchers Chris Rohlf and Yan Ivnitskiy of Matasano Security reported that when a JavaScript Array object had its length set to an extremely large value, the iteration of array elements that occurs when its reduceRight method was subsequently called could result in the execution of attacker controlled memory due to an invalid index value being used to access element properties.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.6.18
OR
mozillafirefoxRange<5
OR
mozillaseamonkeyRange<2.2
OR
mozillathunderbirdRange<3.1.11

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.957 High

EPSS

Percentile

99.4%