Уязвимость use-after-free в функции nsHTMLSelectElement::SubmitNamesValues, позволяющая удаленно выполнять произвольный код или вызывать DoS атаку через повреждение памяти в куче в Mozilla Firefox, Thunderbird и SeaMonkey
Описание
Уязвимость типа use-after-free была обнаружена в функции nsHTMLSelectElement::SubmitNamesValues
. Эта уязвимость позволяет злоумышленникам выполнять произвольный код или вызвать DoS атаки через повреждение памяти в куче. Вектор атаки не был уточнён.
Затронутые версии ПО
- Mozilla Firefox до версии 15.0
- Firefox ESR 10.x до версии 10.0.7
- Thunderbird до версии 15.0
- Thunderbird ESR 10.x до версии 10.0.7
- SeaMonkey до версии 2.12
Тип уязвимости
- Выполнение произвольного кода
- DoS атака через повреждение памяти
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdfThird Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
10 Critical
CVSS2
Дефекты
Связанные уязвимости
Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesVa ...
Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
EPSS
10 Critical
CVSS2