You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2013-65

Mozilla Foundation Security Advisory 2013-65

Title: Buffer underflow when generating CRMF requests
Impact: Critical
Announced: August 6, 2013
Reporter: Nils
Products: Firefox, Seamonkey

Fixed in: Firefox 23.0
  Firefox 17.0.9
  Seamonkey 2.20


Security researcher Nils used the Address Sanitizer to discover a use-after-free problem when generating a Certificate Request Message Format (CRMF) request with certain parameters. This causes a potentially exploitable crash.

In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.