Use-after-free in HTML document templates

Related Vulnerabilities: CVE-2013-5603  

Mozilla Foundation Security Advisory 2013-102

Use-after-free in HTML document templates

Announced
October 29, 2013
Reporter
Abhishek Arya
Impact
Critical
Products
Firefox, Firefox ESR, SeaMonkey, Thunderbird
Fixed in
  • Firefox 25
  • Firefox ESR 24.1
  • SeaMonkey 2.22
  • Thunderbird 24.1

Description

Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover a user-after-free when interacting with HTML document templates. This leads to a potentially exploitable crash.

In general this flaw cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled, but is potentially a risk in browser or browser-like contexts.

References