The asm.js implementation in Mozilla Firefox prior to 36.0.3, Firefox ESR 31.x prior to 31.5.2, and SeaMonkey prior to 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote malicious users to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox esr 31.4 |
||
mozilla firefox esr 31.3.0 |
||
mozilla seamonkey |
||
mozilla firefox esr 31.1.1 |
||
mozilla firefox esr 31.1.0 |
||
mozilla firefox |
||
mozilla firefox esr 31.5 |
||
mozilla firefox esr 31.5.1 |
||
mozilla firefox esr 31.1 |
||
mozilla firefox esr 31.0 |
||
mozilla firefox esr 31.3 |
||
mozilla firefox esr 31.2 |