Use-after-free with select element

Related Vulnerabilities: CVE-2013-1724  

Mozilla Foundation Security Advisory 2013-81

Use-after-free with select element

Announced
September 17, 2013
Reporter
Scott Bell
Impact
Critical
Products
Firefox, SeaMonkey, Thunderbird
Fixed in
  • Firefox 24
  • SeaMonkey 2.21
  • Thunderbird 24

Description

Security researcher Scott Bell used the Address Sanitizer tool to discover a use-after-free when using a <select> element in a form after it has been destroyed. This could lead to a potentially exploitable crash.

In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts.

References