Basic search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:25839
HistoryMar 03, 2011 - 12:00 a.m.

Mozilla Foundation Security Advisory 2011-03

2011-03-0300:00:00
vulners.com
17

Mozilla Foundation Security Advisory 2011-03

Title: Use-after-free error in JSON.stringify
Impact: Critical
Announced: March 1, 2011
Reporter: regenrecht
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.14
Firefox 3.5.17
SeaMonkey 2.0.12
Description

Security researcher regenrecht reported via TippingPoint's Zero Day Initiative that a method used by JSON.stringify contained a use-after-free error in which a currently in-use pointer was freed and subsequently dereferenced. This could lead to arbitrary code execution if an attacker was able to store malicious code in the freed section of memory.

Mozilla developer Igor Bukanov also independently discovered and reported this issue two weeks after the initial report was received.
References

* JSON.stringify dangling pointer bugs
* CVE-2011-0055
Related for SECURITYVULNS:DOC:25839