Mozilla Foundation Security Advisory 2013-97
Title: Writing to cycle collected object during
Announced: October 29, 2013
Reporter: Ezra Pool
Products: Firefox, Thunderbird, Seamonkey
Fixed in: Firefox 25.0
Firefox ESR 24.1
Mozilla community member Ezra Pool reported a potentially exploitable crash on extremely large pages. This was caused when a cycle collected image object was released on the wrong thread during decoding, creating a race condition.
In general this flaw cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled, but is potentially a risk in browser or browser-like contexts.