You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2013-82

Mozilla Foundation Security Advisory 2013-82

Title: Calling scope for new Javascript objects can lead to memory corruption
Impact: High
Announced: September 17, 2013
Reporter: Ms2ger
Products: Firefox, Thunderbird, Seamonkey

Fixed in: Firefox 24.0
  Firefox ESR 17.0.9
  Thunderbird 24.0
  Thunderbird ESR 17.0.9
  Seamonkey 2.21


Mozilla community member Ms2ger found a mechanism where a new Javascript object with a compartment is uninitialized could be entered through web content. When the scope for this object is called, it leads to a potentially exploitable crash.

In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts.