10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.8 High
EPSS
Percentile
98.3%
Impact: Critical
Description: Mozilla identified and fixed several memory safety bugs in the browser engine used in SeaMonkey 2.2 and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
References:
Aral Yaman reported a WebGL crash which affected SeaMonkey 2.2.
Vivekanand Bolajwar reported a JavaScript crash which affected SeaMonkey 2.2.
Bert Hubert andTheo Snelleman of Fox-IT reported a crash in the Ogg reader which affected SeaMonkey 2.2.
Mozilla developers and community members Robert Kaiser, Jesse Ruderman, moz_bug_r_a4, Mardeg, Gary Kwong, Christoph Diehl, Martijn Wargers, Travis Emmitt, Bob Clary and Jonathan Watt reported memory safety issues which affected SeaMonkey 2.2.
Impact: Critical
Description: Rafael Gieschke reported that unsigned JavaScript could call into script inside a signed JAR thereby inheriting the identity of the site that signed the JAR as well as any permissions that a user had granted the signed JAR.
References:
Impact: Critical
Description: Michael Jordon of Context IS reported that an overly long shader program could cause a buffer overrun and crash in a string class used to store the shader source code.
References:
Impact: Critical
Description: Michael Jordon of Context IS reported a potentially exploitable heap overflow in the ANGLE library used by Mozillaโs WebGL implementation.
References:
Impact: Critical
Description: Security researcher regenrecht reported via TippingPointโs Zero Day Initiative that a SVG text manipulation routine contained a dangling pointer vulnerability.
References:
Impact: High
Description: Mike Cardwell reported that Content Security Policy violation reports failed to strip out proxy authorization credentials from the list of request headers.Daniel Veditz reported that redirecting to a website with Content Security Policy resulted in the incorrect resolution of hosts in the constructed policy.
References:
Impact: High
Description: nasalislarvatus3000 reported that when using Windows D2D hardware acceleration, image data from one domain could be inserted into a canvas and read by a different domain.
References:
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2985
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2986
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2991
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2992
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2993
bugzilla.mozilla.org/buglist.cgi?bug_id=646825,648206,650273,650275,651030,660517,662132,665518,667092,667512,668245,669584,650732,667315
bugzilla.mozilla.org/show_bug.cgi?id=648094
bugzilla.mozilla.org/show_bug.cgi?id=655660
bugzilla.mozilla.org/show_bug.cgi?id=655836
bugzilla.mozilla.org/show_bug.cgi?id=657267
bugzilla.mozilla.org/show_bug.cgi?id=664983
bugzilla.mozilla.org/show_bug.cgi?id=665934
bugzilla.mozilla.org/show_bug.cgi?id=665936
bugzilla.mozilla.org/show_bug.cgi?id=672789
bugzilla.mozilla.org/show_bug.cgi?id=674042
bugzilla.mozilla.org/show_bug.cgi?id=679588