You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2013-97

Mozilla Foundation Security Advisory 2013-97

Title: Writing to cycle collected object during image decoding
Impact: High
Announced: October 29, 2013
Reporter: Ezra Pool
Products: Firefox, Thunderbird, Seamonkey

Fixed in: Firefox 25.0
  Firefox ESR 24.1
  Thunderbird 24.1
  Seamonkey 2.22


Mozilla community member Ezra Pool reported a potentially exploitable crash on extremely large pages. This was caused when a cycle collected image object was released on the wrong thread during decoding, creating a race condition.

In general this flaw cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled, but is potentially a risk in browser or browser-like contexts.