Lucene search

K
mozillaMozilla FoundationMFSA2013-92
HistorySep 17, 2013 - 12:00 a.m.

GC hazard with default compartments and frame chain restoration — Mozilla

2013-09-1700:00:00
Mozilla Foundation
www.mozilla.org
12

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.069 Low

EPSS

Percentile

94.0%

Security researcher Nils reported a potentially exploitable use-after-free in an early test version of Firefox 25. Mozilla developer Bobby Holley found that the cause was an older garbage collection bug that a more recent change made easier to trigger.

Affected configurations

Vulners
Node
mozillafirefoxRange<24
OR
mozillaseamonkeyRange<2.21
OR
mozillathunderbirdRange<24
CPENameOperatorVersion
firefoxlt24
seamonkeylt2.21
thunderbirdlt24

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.069 Low

EPSS

Percentile

94.0%