Mozilla Foundation Security Advisory 2009-08

Mozilla Firefox XUL Linked Clones Double Free Vulnerability

Announced
March 4, 2009
Reporter
TippingPoint Zero Day Initiative
Impact
Critical
Products
Firefox
Fixed in
  • Firefox 3.0.7

Description

An anonymous researcher, via TippingPoint's Zero Day Initiative program, reported a vulnerability in Mozilla's garbage collection process. The vulnerability was caused by improper memory management of a set of cloned XUL DOM elements which were linked as a parent and child. After reloading the browser on a page with such linked elements, the browser would crash when attempting to access an object which was already destroyed. An attacker could use this crash to run arbitrary code on the victim's computer.

This vulnerability does not affect Firefox 2, Thunderbird 2, or released versions of SeaMonkey.

References