You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2008-49

Mozilla Foundation Security Advisory 2008-49

Title: Arbitrary code execution via Flash Player dynamic module unloading
Impact: Critical
Announced: November 12, 2008
Reporter: TippingPoint ZDI
Products: Firefox, SeaMonkey

Fixed in: Firefox
  SeaMonkey 1.1.13


An anonymous security researcher reported via TippingPoint's Zero Day Initiative that insufficient checks were being performed to test whether the Flash module was properly dynamically unloaded. The researcher demonstrated that a SWF file which dynamically unloads itself from an outside JavaScript function can cause the browser to access a memory address no longer mapped to the Flash module, resulting in a crash. This crash could be used by an attacker to run arbitrary code on a victim's computer.

Firefox 3 is not affected by this issue.


Disable JavaScript until a version containing these fixes can be installed.