Lucene search

K
mozillaMozilla FoundationMFSA2013-11
HistoryJan 08, 2013 - 12:00 a.m.

Address space layout leaked in XBL objects — Mozilla

2013-01-0800:00:00
Mozilla Foundation
www.mozilla.org
18

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

70.2%

Mozilla security researcher Jesse Ruderman discovered that using the toString function of XBL objects can lead to inappropriate information leakage by revealing the address space layout instead of just the ID of the object. This layout information could potentially be used to bypass ASLR and other security protections.

Affected configurations

Vulners
Node
mozillafirefoxRange<18
OR
mozillafirefox_esrRange<10.0.12
OR
mozillafirefox_esrRange<17.0.2
OR
mozillaseamonkeyRange<2.15
OR
mozillathunderbirdRange<17.0.2
OR
mozillathunderbird_esrRange<10.0.12
OR
mozillathunderbird_esrRange<17.0.2

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

70.2%