WARNING! Fake news / Disputed / BOGUS

0day in Firefox from ToorCon '06

Risk: Low
Local: No
Remote: Yes
CWE: CWE-Other

CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

CNet is writing about some 0day vulnerabilities in Firefox that were demonstrated at ToorCon '06 by Mischa Spiegelmock and Andrew Wbeelsoi: http://news.zdnet.com/2100-1009_22-6121608.html Mischa and Andrew also claim to have found about 30 0day vulnerabilities in Firefox. The article mention that the vulnerabilities from the presentation are specific to Firefox's implementation of Javascript and hints that they are stack overflows. On the other hand, the recent security-related Mozilla commits following the presentation deal with improper validation of scope chain lookups in jsxml.c, jsinterp.c and jsiter.c, which could allow injecting content into the Chrome context. We'll probably see a security release of Firefox in the next week, but in the mean time I have put a couple of links to the code diff's that fix these vulnerabilities at http://blogs.securiteam.com/index.php/archives/657 -- Thor Larholm

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023, cxsecurity.com


Back to Top