Rapid7 Vulnerability & Exploit Database

Mozilla Firefox New Function Race Condition Code Execution Vulnerability

Back to Search

Mozilla Firefox New Function Race Condition Code Execution Vulnerability

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
07/26/2006
Created
07/25/2018
Added
07/31/2006
Modified
02/13/2015

Description

Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.

Solution(s)

  • mozilla-firefox-upgrade-1_5_0_5
  • mozilla-firefox-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;