Mozilla Foundation Security Advisory 2013-65
Buffer underflow when generating CRMF requests
- Announced
- August 6, 2013
- Reporter
- Nils
- Impact
- Critical
- Products
- Firefox, SeaMonkey
- Fixed in
-
- Firefox 17.0.9
- Firefox 23
- SeaMonkey 2.20
Description
Security researcher Nils used the Address Sanitizer to discover a use-after-free problem when generating a Certificate Request Message Format (CRMF) request with certain parameters. This causes a potentially exploitable crash.
In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.