Sunday, July 25, 2010

ZDI : Mozilla Firefox DOM Attribute Cloning Remote Code Execution Vulnerability

Users of ZDI please be advised of a Mozilla Firefox DOM Attribute Cloning Remote Code Execution Vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com

ZDI-10-134: ZDI-10-134: Mozilla Firefox DOM Attribute Cloning Remote Code Execution Vulnerability

Mozilla Firefox DOM
-- Vulnerability Details:

This vulnerability allows remote attackers to execute arbitrary code on

vulnerable installations of Mozilla Firefox. User interaction is

required to exploit this vulnerability in that the target must visit a

malicious page or open a malicious file.



The specific flaw exists due to a workaround that was implemented in

order to support recursive cloning of attribute nodes. If an event is

added to the first attribute node, the application can be made to free

the node, and then later access a reference to it. This can lead to code

execution under the context of the application.
Read more at www.criticalwatch.com
 

No comments:

Post a Comment