Use after free mutating DOM during SetBody

Related Vulnerabilities: CVE-2013-1704  

Mozilla Foundation Security Advisory 2013-64

Use after free mutating DOM during SetBody

Announced
August 6, 2013
Reporter
Nils
Impact
Critical
Products
Firefox, SeaMonkey
Fixed in
  • Firefox 23
  • SeaMonkey 2.20

Description

Security researcher Nils used the Address Sanitizer to discover a use-after-free problem when the Document Object Model is modified during a SetBody mutation event. This causes a potentially exploitable crash.

In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.

References