Уязвимость выполнения произвольного кода или DoS атака из-за повреждения памяти в браузерах Mozilla через использование CSS-свойств -moz-column-*
Описание
Злоумышленники могут использовать специально сформированный документ, который использует CSS-свойства -moz-column-*, чтобы выполнить произвольный код или вызвать DoS атаку через повреждение памяти. Проблема возникает из-за use-after-free ошибки в функции nsOverflowContinuationTracker::Finish.
Затронутые версии ПО
- Mozilla Firefox до версии 19.0
- Firefox ESR 17.x до версии 17.0.3
- Thunderbird до версии 17.0.3
- Thunderbird ESR 17.x до версии 17.0.3
- SeaMonkey до версии 2.16
Тип уязвимости
- Выполнение произвольного кода
- DoS атака через повреждение памяти
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
Use-after-free vulnerability in the nsOverflowContinuationTracker::Fin ...
Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
EPSS
9.3 Critical
CVSS2