Уязвимость выполнения произвольного кода и DoS атаки через повреждение памяти в Mozilla Firefox, Thunderbird и SeaMonkey
Описание
Обнаружена уязвимость использования памяти после её освобождения (use-after-free) в функции PresShell::CompleteMove
. Эта уязвимость позволяет злоумышленникам выполнить произвольный код или вызвать DoS атаку через повреждение памяти в куче в затронутых приложениях.
Затронутые версии ПО
- Mozilla Firefox до версии 15.0
- Mozilla Firefox ESR 10.x до версии 10.0.7
- Mozilla Thunderbird до версии 15.0
- Mozilla Thunderbird ESR 10.x до версии 10.0.7
- Mozilla SeaMonkey до версии 2.12
Тип уязвимости
Удалённое выполнение кода, DoS атака
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdfThird Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
Одно из
EPSS
10 Critical
CVSS2
Дефекты
Связанные уязвимости
Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Use-after-free vulnerability in the PresShell::CompleteMove function i ...
Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
EPSS
10 Critical
CVSS2