Lucene search

K
mozillaMozilla FoundationMFSA2013-97
HistoryOct 29, 2013 - 12:00 a.m.

Writing to cycle collected object during image decoding — Mozilla

2013-10-2900:00:00
Mozilla Foundation
www.mozilla.org
28

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.078 Low

EPSS

Percentile

94.2%

Mozilla community member Ezra Pool reported a potentially exploitable crash on extremely large pages. This was caused when a cycle collected image object was released on the wrong thread during decoding, creating a race condition.

Affected configurations

Vulners
Node
mozillafirefoxRange<25
OR
mozillafirefox_esrRange<24.1
OR
mozillaseamonkeyRange<2.22
OR
mozillathunderbirdRange<24.1

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.078 Low

EPSS

Percentile

94.2%