vmtypedarrayobject.cpp in Mozilla Firefox prior to 28.0, Firefox ESR 24.x prior to 24.4, Thunderbird prior to 24.4, and SeaMonkey prior to 2.25 does not validate the length of the destination array before a copy operation, which allows remote malicious users to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla seamonkey |
||
mozilla firefox esr |
||
mozilla firefox |
||
mozilla thunderbird |
||
debian debian linux 8.0 |
||
debian debian linux 7.0 |
||
opensuse opensuse 12.3 |
||
suse suse linux enterprise software development kit 11.0 |
||
opensuse opensuse 11.4 |
||
suse suse linux enterprise server 11 |
||
opensuse opensuse 13.1 |
||
suse suse linux enterprise desktop 11 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux server eus 6.5 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux server aus 6.5 |
||
redhat enterprise linux server tus 6.5 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux eus 6.5 |
||
canonical ubuntu linux 13.10 |
||
canonical ubuntu linux 12.10 |
||
canonical ubuntu linux 12.04 |