You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2013-108

Mozilla Foundation Security Advisory 2013-108

Title: Use-after-free in event listeners
Impact: Critical
Announced: December 10, 2013
Reporter: Tyson Smith, Jesse Schwartzentruber
Products: Firefox, Thunderbird, Seamonkey

Fixed in: Firefox 26
  Firefox ESR 24.2
  Thunderbird 24.2
  Seamonkey 2.23


Security researchers Tyson Smith and Jesse Schwartzentruber of the BlackBerry Security Automated Analysis Team used the Address Sanitizer tool while fuzzing to discover a user-after-free when interacting with event listeners from the mListeners array. This leads to a potentially exploitable crash.

In general these flaws cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts.