Release date:
Last Updated:
Hazard level:
Vulnerability Type: Buffer Overflow
Threat Type: Remote
Vulnerability introduction:
Mozilla Firefox is a free, open-source browser applicable to Windows, Linux, and MacOS X platforms.
During the implementation of the WebGL coloring function of Mozilla Firefox versions 4. x to 5, the undefined string class has the buffer overflow vulnerability. Remote attackers can execute arbitrary code or cause denial-of-service (application crash) by using an ultra-long source code block shadow ).
Vulnerability announcement:
Currently, the vendor has released an upgrade patch to fix this security issue. Obtain the patch link:
Https://developer.mozilla.org/en/Download_Mozilla_Source_Code
Reference URL:
Source: bugzilla.w.illa.org
Link: https://bugzilla.mozilla.org/show_bug.cgi? Id = 665936
Source: www.mozilla.org
Link: http://www.mozilla.org/security/announce/2011/mfsa2011-29.html
Source: SECUNIA
Name: 45581
Link: http://secunia.com/advisories/45581