Lucene search

K
mozillaMozilla FoundationMFSA2013-24
HistoryFeb 19, 2013 - 12:00 a.m.

Web content bypass of COW and SOW security wrappers — Mozilla

2013-02-1900:00:00
Mozilla Foundation
www.mozilla.org
14

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.3%

Mozilla developer Bobby Holley discovered that it was possible to bypass some protections in Chrome Object Wrappers (COW) and System Only Wrappers (SOW), making their prototypes mutable by web content. This could be used leak information from chrome objects and possibly allow for arbitrary code execution.

Affected configurations

Vulners
Node
mozillafirefoxRange<19
OR
mozillafirefox_esrRange<17.0.3
OR
mozillaseamonkeyRange<2.16
OR
mozillathunderbirdRange<17.0.3
OR
mozillathunderbird_esrRange<17.0.3

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.3%