Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Mozilla Firefox / Thunderbird Multiple Vulnerabilities

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
Mozilla Firefox / Thunderbird Multiple Vulnerabilities

Secunia Mozilla Firefox / Thunderbird Multiple Vulnerabilities
Secunia Official 30th Jul, 2014 20:13
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
Some vulnerabilities have been reported in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

1) Some unspecified errors can be exploited to cause memory corruption.

2) Some other unspecified errors can be exploited to cause memory corruption.

3) An error when buffering Web Audio for playback can be exploited to cause a heap-based buffer overflow.

4) A use-after-free error related to ordering of control messages for Web Audio can be exploited to cause memory corruption.

5) A use-after-free error in DirectWrite when rendering MathML content can be exploited to cause memory corruption.

6) A use-after-free error when handling the FireOnStateChange event can be exploited to cause memory corruption.

7) An unspecified error when using the Cesium JavaScript library to generate WebGL content can be exploited to cause memory corruption.

8) The application bundles a vulnerable version of the Network Security Services (NSS) library.

For more information:
SA59350

9) A use-after-free error when handling certain image data while performing scaling operations in the Skia library can be exploited to cause memory corruption.

Successful exploitation of vulnerabilities #1 through #9 may allow execution of arbitrary code.

10) An error related to iframe elements when handling network redirects can be exploited to bypass iframe sandboxing restrictions.

NOTE: Additionally this fixes a weakness, which can be exploited to manipulate certain icons within the UI.

The vulnerabilities are reported in versions prior to 31.0.

Ih4VzjBEESIySb8f RE: Mozilla Firefox / Thunderbird Multiple Vulnerabilities
Member 30th Jul, 2014 20:13
Score: 0
Posts: 1
User Since: 9th Dec 2011
System Score: N/A
Location: US
Last edited on 30th Jul, 2014 20:13
You state that Thunderbird will be upgraded to version 25.7.0. I am running the most recent version which is 31.0. Which is correct?
Was this reply relevant?
+0
-0
taffy078 RE: Mozilla Firefox / Thunderbird Multiple Vulnerabilities
Contributor 31st Jul, 2014 09:16
Score: 408
Posts: 1,340
User Since: 26th Feb 2009
System Score: 100%
Location: UK
Hello, Ih4VzjBEESIySb8f

This section is used by Secunia to announce issues. It is not normally used for discussions.

May I suggest that you repost your reply as a new thread in the PSI section. You might also want to read this thread there:
http://secunia.com/community/forum/thread/show/150...

--
taffy078, West Yorkshire, UK

Desktop: Compaq Presario (OEM) 32 bit / AMD Athlon / 2 GB RAM
XP Home - SP3/ IE8/ Norton IS - Secunia PSI v2.0.0.3003

Laptop: Win 7 / IE11 / PSI v2.0.0.3003
Was this reply relevant?
+0
-0


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer