Информационная безопасность
[RU] switch to English

Дополнительная информация

  Многочисленные уязвимости безопасности в Mozilla Firefox / Seamonkey

  ZDI-10-113: Mozilla Firefox XSLT Sort Remote Code Execution Vulnerability

  Mozilla Foundation Security Advisory 2010-33

  Mozilla Foundation Security Advisory 2010-32

  Mozilla Foundation Security Advisory 2010-31

Date:25 июня 2010 г.
Subject:Mozilla Foundation Security Advisory 2010-30

Mozilla Foundation Security Advisory 2010-30

Title: Integer Overflow in XSLT Node Sorting
Impact: Critical
Announced: June 22, 2010
Reporter: Martin Barbella
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.6.4
 Firefox 3.5.10
 Thunderbird 3.0.5
 SeaMonkey 2.0.5

Security researcher Martin Barbella reported via TippingPoint's Zero Day Initiative that an XSLT node sorting routine contained an integer overflow vulnerability. In cases where one of the nodes to be sorted contained a very large text value, the integer used to allocate a memory buffer to store its value would overflow, resulting in too small a buffer being created. An attacker could use this vulnerability to write data past the end of the buffer, causing the browser to crash and potentially running arbitrary code on a victim's computer.

   * https://bugzilla.mozilla.org/show_bug.cgi?id=554255
   * CVE-2010-1199

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород