Sunday, July 25, 2010

ZDI : Mozilla Firefox Remote Code Execution Vulnerability

Users of ZDI please be advised of a Mozilla Firefox Remote Code Execution Vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
ZDI-10-132: ZDI-10-132 Mozilla Firefox Remote Code Execution Vulnerability
Mozilla Firefox Plugin Parameter
-- Vulnerability Details:

This vulnerability allows remote attackers to execute arbitrary code on

vulnerable installations of Mozilla Firefox. User interaction is

required to exploit this vulnerability in that the target must visit a

malicious page or open a malicious file.



The specific flaw exists within the browser's method for parsing child

elements out of a particular tag. The application will use a 32-bit

index to enumerate them, but will store it in a 16-bit signed integer

and then use it to allocate space for a cache. When populating the

cache a buffer overflow will occur. This can lead to code execution

under the context of the application.Read more at www.criticalwatch.com
 

No comments:

Post a Comment