Computer Security
[EN] securityvulns.ru no-pyccku


Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities
Published:03.03.2011
Source:
SecurityVulns ID:11477
Type:client
Threat Level:
9/10
Description:Multiple memory corruptions, buffer overflows, user-after-free, crossite scripting, crossite request forgery, etc.
Affected:MOZILLA : SeaMonkey 2.0
 MOZILLA : Firefox 3.6
 MOZILLA : Thunderbird 3.1
CVE:CVE-2011-0062 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.14 and Thunderbird 3.1.x before 3.1.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-0061 (Buffer overflow in Mozilla Firefox 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image.)
 CVE-2011-0059 (Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.)
 CVE-2011-0058 (Buffer overflow in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long string that triggers construction of a long text run.)
 CVE-2011-0057 (Use-after-free vulnerability in the Web Workers implementation in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to execute arbitrary code via vectors related to a JavaScript Worker and garbage collection.)
 CVE-2011-0056 (Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving exception timing and a large number of string values, aka an "atom map" issue.)
 CVE-2011-0055 (Use-after-free vulnerability in the JSON.stringify method in js3250.dll in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via unspecified vectors related to the js_HasOwnProperty function and garbage collection.)
 CVE-2011-0054 (Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving non-local JavaScript variables, aka an "upvarMap" issue.)
 CVE-2011-0053 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-0051 (Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, does not properly handle certain recursive eval calls, which makes it easier for remote attackers to force a user to respond positively to a dialog question, as demonstrated by a question about granting privileges.)
 CVE-2010-1585 (The nsIScriptableUnescapeHTML.parseFragment method in Mozilla Firefox does not properly sanitize HTML, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.)
Original documentdocumentZDI, ZDI-11-103: Mozilla Firefox JSON.stringify Dangling Pointer Remote Code Execution Vulnerability (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-10 (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-09 (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-08 (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-07 (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-06 (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-05 (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-04 (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-03 (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-02 (03.03.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-01 (03.03.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod