The asm.js implementation in Mozilla Firefox prior to 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote malicious users to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox |
||
opensuse opensuse 13.1 |
||
opensuse opensuse 13.2 |