Use-after-free during XML transformations

ID MFSA2016-27
Type mozilla
Reporter Mozilla Foundation
Modified 2016-03-08T00:00:00


Security researcher Nicolas Grégoire used the Address Sanitizer to find a use-after-free during XML transformation operations. This results in a potentially exploitable crash triggerable by web content.

In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts.