The Script.prototype.freeze/thaw functionality in Mozilla 1.4 and earlier allows attackers to execute native methods by modifying the string used as input to the script.thaw JavaScript function, which is then deserialized and executed.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 | vendor advisory broken link |
http://www.osvdb.org/8390 | patch vendor advisory broken link vdb entry |
http://secunia.com/advisories/11103/ | third party advisory url repurposed |
http://www.securityfocus.com/bid/9322 | patch vdb entry vendor advisory broken link third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=221526 | patch vendor advisory issue tracking |
http://www.securityfocus.com/advisories/6979 | patch vdb entry vendor advisory broken link third party advisory |