Уязвимость повреждения памяти через использование методов mozRequestFullScreen и history.back в Mozilla Firefox, Thunderbird и SeaMonkey
Описание
Уязвимость типа use-after-free в Mozilla Firefox, Thunderbird и SeaMonkey может позволять удалённым злоумышленникам, с помощью пользователя, выполнять произвольный код. Уязвимость связана с использованием метода mozRequestFullScreen
для перехода в полноэкранный режим и метода history.back
для навигации назад по истории.
Затронутые версии ПО
- Mozilla Firefox до версии 16.0
- Mozilla Firefox ESR 10.x до версии 10.0.8
- Thunderbird до версии 16.0
- Thunderbird ESR 10.x до версии 10.0.8
- SeaMonkey до версии 2.13
Тип уязвимости
Удалённое выполнение кода
Ссылки
- Third Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Issue TrackingVendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox E ...
Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
EPSS
9.3 Critical
CVSS2