Mozilla Foundation Security Advisory 2006-27
Table Rebuilding Code Execution Vulnerability
- Announced
- April 21, 2006
- Reporter
- TippingPoint and the Zero Day Initiative
- Impact
- Critical
- Products
- Firefox, Mozilla Suite, SeaMonkey, Thunderbird
- Fixed in
-
- Firefox 1.0.8
- Firefox 1.5.0.2
- Mozilla Suite 1.7.13
- SeaMonkey 1.0.1
- Thunderbird 1.0.8
- Thunderbird 1.5.0.2
Description
An anonymous researcher for TippingPoint and the Zero Day Initiative reports that an invalid and nonsensical ordering of table-related tags causes Mozilla to use a negative array index. This invalid memory use can be exploited to run code of the attacker's choice.
Workaround
Upgrade to fixed version.
Although JavaScript is not involved in the vulnerability itself, disabling JavaScript may prevent an attacker from effectively preparing memory in order to carry out the exploit.