Lucene search

K
zdiRegenrechtZDI-11-103
HistoryMar 02, 2011 - 12:00 a.m.

Mozilla Firefox JSON.stringify Dangling Pointer Remote Code Execution Vulnerability

2011-03-0200:00:00
regenrecht
www.zerodayinitiative.com
28
mozilla firefox
json.stringify
dangling pointer
remote code execution
user interaction
js3250.dll
invalid pointer
garbage collection

EPSS

0.108

Percentile

95.2%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within js3250.dll. In the JSON.stringify() call chain js_HasOwnProperty() is called with an invalid pointer. The pointer becomes invalid due to being unrooted and garbage collection occurring. Dereferecing of this pointer allows a remote attacker to execute arbitrary code in the context of the user running the browser.