The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.mozilla.org/security/announce/2012/mfsa2012-30.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75155 | vdb entry |
http://secunia.com/advisories/49055 | third party advisory |
http://www.securityfocus.com/bid/53227 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16893 | signature vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:081 | vendor advisory |
http://secunia.com/advisories/48972 | third party advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:066 | vendor advisory |
http://secunia.com/advisories/49047 | third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=727547 |