Уязвимость выполнения произвольного кода и DoS атака в Mozilla Firefox, Thunderbird и SeaMonkey через некорректную обработку quickstubs, использующих тип данных jsval для возвращаемых значений
Описание
в Mozilla Firefox, Thunderbird и SeaMonkey обнаружена уязвимость, связанная с некорректной реализацией quickstubs, использующих тип данных jsval для возвращаемых значений. Это позволяет злоумышленникам выполнять произвольный код или совершать DoS атаку, вызывая аварийное завершение работы приложения, через специально подготовленный JavaScript-код, некорректно обрабатываемый во время сборки мусора.
Затронутые версии ПО
- Mozilla Firefox до версии 18.0
- Firefox ESR 10.x до версии 10.0.12 и 17.x до версии 17.0.2
- Thunderbird до версии 17.0.2
- Thunderbird ESR 10.x до версии 10.0.12 и 17.x до версии 17.0.2
- SeaMonkey до версии 2.15
Тип уязвимости
- Выполнение произвольного кода
- DoS атака
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x ...
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
EPSS
9.3 Critical
CVSS2