Mozilla Foundation Security Advisory 2012-96
Memory corruption in str_unescape
- Announced
- November 20, 2012
- Reporter
- Scott Bell
- Impact
- High
- Products
- Firefox, SeaMonkey, Thunderbird
- Fixed in
-
- Firefox 17
- SeaMonkey 2.14
- Thunderbird 17
Description
Security researcher Scott Bell of Security-Assessment.com used the Address Sanitizer tool to discover a memory corruption in str_unescape
in the Javascript engine. This could potentially lead to arbitrary code execution.
In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.