Уязвимость удалённого выполнения кода через XBL-биндинги в Mozilla Firefox, Thunderbird, Mozilla Suite и SeaMonkey
Описание
Mozilla Firefox и Thunderbird версий 1.x до 1.5 и 1.0.x до 1.0.8, Mozilla Suite до 1.7.13 и SeaMonkey до версии 1.0 некорректно защищают область компиляции привилегированных встроенных привязок XBL, что позволяет удаленно расположенным злоумышленникам выполнить произвольный код с помощью методов (1) valueOf.call или (2) valueOf.apply привязки XBL, или (3) путем вставки метода XBL в прототипную цепочку document.body в DOM
Затронутые версии ПО
- Mozilla Firefox версии 1.x до 1.5 и 1.0.x до 1.0.8
- Mozilla Thunderbird версии 1.x до 1.5 и 1.0.x до 1.0.8
- Mozilla Suite до версии 1.7.13
- SeaMonkey до версии 1.0
Тип уязвимости
- Удалённое выполнение кода
Ссылки
- Patch
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Одно из
EPSS
6.8 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) "by inserting an XBL method into the DOM's document.body prototype chain."
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) "by inserting an XBL method into the DOM's document.body prototype chain."
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, ...
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) "by inserting an XBL method into the DOM's document.body prototype chain."
EPSS
6.8 Medium
CVSS2