Уязвимость выполнения произвольного кода в Mozilla Firefox, Thunderbird и SeaMonkey через эксплуатацию use-after-free в реализации ListenerManager
Описание
Уязвимость типа use-after-free обнаружена в реализации ListenerManager
в Mozilla Firefox, Thunderbird и SeaMonkey. Эта уязвимость позволяет злоумышленникам выполнить произвольный код. Проблема возникает из-за некорректного управления памятью при обработке объектов слушателей, что приводит к ошибкам после выделения памяти и последующего запуска сборки мусора.
Затронутые версии ПО
- Mozilla Firefox до версии 18.0
- Firefox ESR 10.x до версии 10.0.12
- Firefox ESR 17.x до версии 17.0.2
- Thunderbird до версии 17.0.2
- Thunderbird ESR 10.x до версии 10.0.12
- Thunderbird ESR 17.x до версии 17.0.2
- SeaMonkey до версии 2.15
Тип уязвимости
Удалённое выполнение кода
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
Use-after-free vulnerability in the ListenerManager implementation in ...
Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
EPSS
9.3 Critical
CVSS2