Advisory Details

April 2nd, 2010

Mozilla Firefox PluginArray nsMimeType Dangling Pointer Remote Code Execution Vulnerability

ZDI-10-049
ZDI-CAN-655

CVE ID CVE-2010-0177
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Mozilla Firefox
AFFECTED PRODUCTS 3.5.x
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['3377']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that a user must be coerced to viewing a malicious document.

The specific flaw exists within the way the application implements the window.navigator.plugins array. Due to the application freeing the contents of the array while a reference to one of the elements is still being used, an attacker can utilize the free reference to call arbitrary code. Successful exploitation can lead to code execution under the context of the application.

ADDITIONAL DETAILS Mozilla Firefox has issued an update to correct this vulnerability. More details can be found at:
http://www.mozilla.org/security/announce/2010/mfsa2010-19.html
DISCLOSURE TIMELINE
  • 2010-01-06 - Vulnerability reported to vendor
  • 2010-04-02 - Coordinated public release of advisory
CREDIT regenrecht
BACK TO ADVISORIES