Mozilla Foundation Security Advisory 2014-75

Buffer overflow during CSS manipulation

Announced
October 14, 2014
Reporter
Atte Kettunen
Impact
High
Products
Firefox, Firefox ESR, SeaMonkey, Thunderbird
Fixed in
  • Firefox 33
  • Firefox ESR 31.2
  • SeaMonkey 2.30
  • Thunderbird 31.2

Description

Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG discovered a buffer overflow when making capitalization style changes during CSS parsing. This can cause a crash that is potentially exploitable.

References