Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Mozilla Firefox / Thunderbird / SeaMonkey HTML Editor Use-After-F...

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
Mozilla Firefox / Thunderbird / SeaMonkey HTML Editor Use-After-Free Vulnerability

Secunia Mozilla Firefox / Thunderbird / SeaMonkey HTML Editor Use-After-Free Vulnerability
Secunia Official 8th Mar, 2013 17:04
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
A vulnerability has been reported in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a use-after-free error within the HTML editor when content script is run by the "document.execCommand()" function while performing certain internal editing operations. This can be exploited to reference data from already freed memory.

Successful exploitation allows execution of arbitrary code.

The vulnerability is reported in the following products:
* Mozilla Firefox versions prior to 19.0.2
* Mozilla Firefox ESR, Thunderbird, and Thunderbird ESR versions prior to 17.0.4
* Mozilla SeaMonkey versions prior to 2.16.1

JeremyH RE: Mozilla Firefox / Thunderbird / SeaMonkey HTML Editor Use-After-Free Vulnerability
Member 8th Mar, 2013 17:04
Score: 0
Posts: 3
User Since: 13th Feb 2012
System Score: N/A
Location: US
Last edited on 8th Mar, 2013 17:04
Mozilla Firefox ESR, Thunderbird, and Thunderbird ESR versions prior to 17.0.4 - Does this mean it includes FireFox ESR 10.0.x instances too?
Was this reply relevant?
+0
-0
Maurice Joyce RE: Mozilla Firefox / Thunderbird / SeaMonkey HTML Editor Use-After-Free Vulnerability
Handling Contributor 8th Mar, 2013 17:21
Score: 11723
Posts: 8,968
User Since: 4th Jan 2009
System Score: N/A
Location: UK
Not according to Mozilla here:

http://www.mozilla.org/security/announce/2013/mfsa...



--
Maurice

Windows 7 SP1 64 Bit OS
HP Intel Pentium i7
IE 11 for Windows 7 SP1
16GB RAM
Was this reply relevant?
+0
-0
JeremyH RE: Mozilla Firefox / Thunderbird / SeaMonkey HTML Editor Use-After-Free Vulnerability
Member 8th Mar, 2013 17:37
Score: 0
Posts: 3
User Since: 13th Feb 2012
System Score: N/A
Location: US
Last edited on 8th Mar, 2013 17:38
** sorry for the double post. **
Was this reply relevant?
+0
-0
ddmarshall RE: Mozilla Firefox / Thunderbird / SeaMonkey HTML Editor Use-After-Free Vulnerability
Dedicated Contributor 8th Mar, 2013 19:17
Score: 1208
Posts: 960
User Since: 8th Nov 2008
System Score: 98%
Location: UK
As far as I know, Firefox 10esr went end of life when Firefox 19 and Firefox 17.0.3esr were released. There won't be any more fixes for Firefox 10esr.

See policy here: https://www.mozilla.org/en-US/firefox/organization...

--
This answer is provided “as-is.” You bear the risk of using it.
Was this reply relevant?
+1
-0
Anthony Wells RE: Mozilla Firefox / Thunderbird / SeaMonkey HTML Editor Use-After-Free Vulnerability
Expert Contributor 10th Mar, 2013 15:32
Score: 2437
Posts: 3,327
User Since: 19th Dec 2007
System Score: N/A
Location: N/A

Hi ,

The ESR download page no longer offers ESR 10.x only 17.0.4 :-

https://www.mozilla.org/en-US/firefox/organization...

which would imply that platform 10.x is no longer supported (as planned by Mozilla) and might be/probably is (potentially) vulnerable . Definitely not worth the risk ; being a browser an' all that .

If you still have 10.x ESR , what does the PSI display as it's status - afetr a full scan ??

What happens when you look in the open browser's Help menu -> About Firefox ??


Anthony




--


It always seems impossible until its done.
Nelson Mandela
Was this reply relevant?
+0
-0


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability