Race condition in Mozilla Firefox allows remote attackers to produce a JavaScript message with a spoofed domain association by writing the message in between the document request and document load for a web page in a different domain.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/54611 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2009-12/0104.html | mailing list |
http://securitytracker.com/id?1023287 | vdb entry |
http://www.securityfocus.com/bid/37230 | vdb entry |