Lucene search

K
zdiNils of MWR InfoSecurity (http://twitter.com/MWRlabs)ZDI-10-063
HistoryApr 05, 2010 - 12:00 a.m.

Mozilla Firefox Cross Document DOM Node Moving Remote Code Execution Vulnerability

2010-04-0500:00:00
Nils of MWR InfoSecurity (http://twitter.com/MWRlabs)
www.zerodayinitiative.com
24

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.274 Low

EPSS

Percentile

96.7%

This vulnerability allows remote attackers to bypass specific script execution enforcements on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists when moving DOM nodes in between documents with a specific timing while triggering garbage collection. If timed correctly Firefox will incorrectly reference a previously freed object which can be leveraged by an attacker to execute arbitrary code under the context of the current user.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.274 Low

EPSS

Percentile

96.7%