Mozilla Foundation Security Advisory 2011-48
Miscellaneous memory safety hazards (rv:8.0)
- November 8, 2011
- Firefox, SeaMonkey, Thunderbird
- Fixed in
- Firefox 8
- SeaMonkey 2.5
- Thunderbird 8
Mozilla developers fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.
Jason Orendorff, Boris Zbarsky, Gregg Tavares, Mats Palmgren, Christian Holler, Jesse Ruderman, Simona Marcu, Bob Clary, and William McCloskey reported memory safety problems that affected Firefox 7.
Security researcher Rh0 reported a potentially exploitable crash due to unchecked allocation failure.
Security researcher Aki Helin reported a potentially
exploitable crash with an SVG
<mpath> linking to
a non-SVG element.