Computer Security
[EN] securityvulns.ru
no-pyccku

  

Related information

  Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities

  ZDI-11-103: Mozilla Firefox JSON.stringify Dangling Pointer Remote Code Execution Vulnerability

  Mozilla Foundation Security Advisory 2011-10

  Mozilla Foundation Security Advisory 2011-09

  Mozilla Foundation Security Advisory 2011-08

From:MOZILLA
Date:03.03.2011
Subject:Mozilla Foundation Security Advisory 2011-04

Mozilla Foundation Security Advisory 2011-04

Title: Buffer overflow in JavaScript upvarMap
Impact: Critical
Announced: March 1, 2011
Reporter: Christian Holler
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.6.14
 Firefox 3.5.17
 SeaMonkey 2.0.12
Description

Security researcher Christian Holler reported that the JavaScript engine's internal memory mapping of non-local JS variables contained a buffer overflow which could potentially be used by an attacker to run arbitrary code on a victim's computer.
References

   * https://bugzilla.mozilla.org/show_bug.cgi?id=615657
   * CVE-2011-0054

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod

 
 



Rating@Mail.ru