Mozilla Foundation Security Advisory 2014-75
Buffer overflow during CSS manipulation
- Announced
- October 14, 2014
- Reporter
- Atte Kettunen
- Impact
- High
- Products
- Firefox, Firefox ESR, SeaMonkey, Thunderbird
- Fixed in
-
- Firefox 33
- Firefox ESR 31.2
- SeaMonkey 2.30
- Thunderbird 31.2
Description
Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG discovered a buffer overflow when making capitalization style changes during CSS parsing. This can cause a crash that is potentially exploitable.