You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2013-48
Mozilla Foundation Security Advisory 2013-48
Title: Memory corruption found using Address Sanitizer
Impact: Critical
Announced: May 14, 2013
Reporter: Abhishek Arya
Products: Firefox, Thunderbird
Fixed in: Firefox 21.0
Firefox ESR 17.0.6
Thunderbird 17.0.6
Thunderbird ESR 17.0.6
Description
Security researcher Abhishek Arya (Inferno) of the Google
Chrome Security Team used the Address Sanitizer tool to discover a series of
use-after-free, out of bounds read, and invalid write problems rated as moderate
to critical as security issues in shipped software. Some of these issues are
potentially exploitable, allowing for remote code execution. We would also like
to thank Abhishek for reporting additional use-after-free flaws in
dir=auto code introduced during Firefox development. These were
fixed before general release.
References
- Out of Bounds Read in SelectionIterator::GetNextSegment (CVE-2013-1676)
- Out-of-bound read in gfxSkipCharsIterator::SetOffsets (CVE-2013-1677))
- Invalid write in _cairo_xlib_surface_add_glyph (CVE-2013-1678)
- Heap-use-after-free in mozilla::plugins::child::_geturlnotify (CVE-2013-1679)
- Heap-use-after-free in nsFrameList::FirstChild (CVE-2013-1680)
- Heap-use-after-free in nsContentUtils::RemoveScriptBlocker (CVE-2013-1681)
