Mozilla Foundation Security Advisory 2015-66
Vulnerabilities found through code inspection
- Announced
- July 2, 2015
- Reporter
- Ronald Crane
- Impact
- Critical
- Products
- Firefox, Firefox ESR, Firefox OS, SeaMonkey, Thunderbird
- Fixed in
-
- Firefox 39
- Firefox ESR 31.8
- Firefox ESR 38.1
- Firefox OS 2.2
- SeaMonkey 2.35
- Thunderbird 31.8
- Thunderbird 38.1
Description
Security researcher Ronald Crane reported seven vulnerabilities affecting released code that he found through code inspection. These included three uses of uninitialized memory, one poor validation leading to an exploitable crash, one read of unowned memory in zip files, and two buffer overflows. These do not all have clear mechanisms to be exploited through web content but are vulnerable if a mechanism can be found to trigger them.
References
- CairoTextureClientD3D9::BorrowDrawTarget using uninitialized memory (CVE-2015-2734)
- Memory safety bug due to bad test in nsZipArchive.cpp (CVE-2015-2735)
- nsZipArchive::BuildFileList has memory-safety bug (CVE-2015-2736)
- rx::d3d11::SetBufferData using uninitialized memory (CVE-2015-2737)
- YCbCrImageDataDeserializer::ToDataSourceSurface using uninitialized memory (CVE-2015-2738)
- Memory safety problem in ArrayBufferBuilder::append (CVE-2015-2739)
- Overflow in nsXMLHttpRequest::AppendToResponseText causes memory-safety bug (CVE-2015-2740)