Advisory Details

April 2nd, 2010

Mozilla Firefox nsTreeSelection EventListener Remote Code Execution Vulnerability

ZDI-10-050
ZDI-CAN-669

CVE ID CVE-2010-0175
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Mozilla Firefox
AFFECTED PRODUCTS 3.5.x
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['3377']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on software utilizing a vulnerable version of Mozilla's Firefox. User interaction is required in that the victim must visit a malicious website or be coerced into opening a malicious document.

The specific flaw exists within how the application handles particular events for an nsTreeSelection element. Upon execution of a "select" event the application will access an element without checking to see if it's been previously freed or not. Successful exploitation can lead to code execution under the context of the application.

ADDITIONAL DETAILS Mozilla Firefox has issued an update to correct this vulnerability. More details can be found at:
http://www.mozilla.org/security/announce/2010/mfsa2010-17.html
DISCLOSURE TIMELINE
  • 2010-01-15 - Vulnerability reported to vendor
  • 2010-04-02 - Coordinated public release of advisory
CREDIT regenrecht
BACK TO ADVISORIES