Уязвимость use-after-free в компоненте XMLSerializer при обработке веб-контента в Mozilla Firefox, Thunderbird и SeaMonkey
Описание
Уязвимость использования после освобождения (use-after-free) обнаружена в компоненте XMLSerializer
, а именно в реализации метода serializeToStream
. Эта уязвимость позволяет злоумышленникам выполнить произвольный код при помощи специально созданного веб-контента.
Затронутые версии ПО
- Mozilla Firefox до версии 18.0
- Mozilla Firefox ESR 10.x до версии 10.0.12
- Mozilla Firefox ESR 17.x до версии 17.0.2
- Mozilla Thunderbird до версии 17.0.2
- Mozilla Thunderbird ESR 10.x до версии 10.0.12
- Mozilla Thunderbird ESR 17.x до версии 17.0.2
- Mozilla SeaMonkey до версии 2.15
Тип уязвимости
Удалённое выполнение кода
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
Use-after-free vulnerability in the serializeToStream implementation i ...
Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
EPSS
9.3 Critical
CVSS2