Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:27344
HistoryNov 25, 2011 - 12:00 a.m.

Mozilla Foundation Security Advisory 2011-48

2011-11-2500:00:00
vulners.com
47

EPSS

0.637

Percentile

97.9%

Mozilla Foundation Security Advisory 2011-48

Title: Miscellaneous memory safety hazards (rv:8.0)
Impact: Critical
Announced: November 8, 2011
Products: Firefox, Thunderbird

Fixed in: Firefox 8.0
Thunderbird 8.0
Description

Mozilla developers fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.

References

Jason Orendorff, Boris Zbarsky, Gregg Tavares, Mats Palmgren, Christian Holler, Jesse Ruderman, Simona Marcu, Bob Clary, and William McCloskey reported memory safety problems that affected Firefox 7.

Memory safety bugs fixed in Firefox 8
CVE-2011-3651
Security researcher Rh0 reported a potentially exploitable crash due to unchecked allocation failure.

https://bugzilla.mozilla.org/show_bug.cgi?id=682727
CVE-2011-3652
Security researcher Aki Helin reported a potentially exploitable crash with an SVG <mpath> linking to a non-SVG element.

https://bugzilla.mozilla.org/show_bug.cgi?id=694953
CVE-2011-3654