Mozilla Foundation Security Advisory 2011-48

2011-11-25T00:00:00
ID SECURITYVULNS:DOC:27344
Type securityvulns
Reporter Securityvulns
Modified 2011-11-25T00:00:00

Description

Mozilla Foundation Security Advisory 2011-48

Title: Miscellaneous memory safety hazards (rv:8.0) Impact: Critical Announced: November 8, 2011 Products: Firefox, Thunderbird

Fixed in: Firefox 8.0 Thunderbird 8.0 Description

Mozilla developers fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.

References

Jason Orendorff, Boris Zbarsky, Gregg Tavares, Mats Palmgren, Christian Holler, Jesse Ruderman, Simona Marcu, Bob Clary, and William McCloskey reported memory safety problems that affected Firefox 7.

Memory safety bugs fixed in Firefox 8 CVE-2011-3651 Security researcher Rh0 reported a potentially exploitable crash due to unchecked allocation failure.

https://bugzilla.mozilla.org/show_bug.cgi?id=682727 CVE-2011-3652 Security researcher Aki Helin reported a potentially exploitable crash with an SVG <mpath> linking to a non-SVG element.

https://bugzilla.mozilla.org/show_bug.cgi?id=694953 CVE-2011-3654