|
|
|
|
| |
Credit:
The information has been provided by Orlando Barrera II.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-046
|
| |
Vulnerable Systems:
* Mozilla Firefox 3.6.x
User interaction is required to exploit this vulnerability in that the target must visit a malicious page.
The specific flaw exists within the implementation of web worker threads. Due to mishandling the array data type while processing posted messages, a web worker thread can be made to corrupt heap memory. An attacker can exploit this vulnerability to execute arbitrary code under the context of the user running the browser.
Patch Availability:
Mozilla Firefox has issued an update to correct this vulnerability. More details can be found at:
http://www.mozilla.org/security/announce/2010/mfsa2010-02.html
CVE Information:
CVE-2010-0160
Disclosure Timeline:
2009-12-04 - Vulnerability reported to vendor
2010-04-02 - Coordinated public release of advisory
|
|
|
|
|