Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:24956
HistoryOct 23, 2010 - 12:00 a.m.

Mozilla Foundation Security Advisory 2010-65

2010-10-2300:00:00
vulners.com
28

Mozilla Foundation Security Advisory 2010-65

Title: Buffer overflow and memory corruption using document.write
Impact: Critical
Announced: October 19, 2010
Reporter: Alexander Miller
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.6.11
Firefox 3.5.14
Thunderbird 3.1.5
Thunderbird 3.0.9
SeaMonkey 2.0.9
Description

Security researcher Alexander Miller reported that passing an excessively long string to document.write could cause text rendering routines to end up in an inconsistent state with sections of stack memory being overwritten with the string data. An attacker could use this flaw to crash a victim's browser and potentially run arbitrary code on their computer.
References

* https://bugzilla.mozilla.org/show_bug.cgi?id=583077
* CVE-2010-3179