Уязвимость множественных переполнений целых чисел в реализации двоичного поиска в SpiderMonkey, Mozilla Firefox и SeaMonkey, приводящая к DoS атаке и другим воздействиям
Описание
Злоумышленник способен вызвать DoS атаку через некорректный доступ к элементам массива или, возможно, оказать другое неопределенное воздействие. Это осуществляется путем выполнения специально созданного JavaScript-кода в SpiderMonkey в Mozilla Firefox и SeaMonkey.
Затронутые версии ПО
- Mozilla Firefox до версии 26.0
- SeaMonkey до версии 2.23
Тип уязвимости
- DoS атака
- Влияние на целостность данных
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
7.5 High
CVSS2
Дефекты
Связанные уязвимости
Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
Multiple integer overflows in the binary-search implementation in Spid ...
Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
EPSS
7.5 High
CVSS2