The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html | third party advisory vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16939 | signature third party advisory vdb entry |
http://www.mozilla.org/security/announce/2013/mfsa2013-14.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-1681-4 | third party advisory vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=813901 | patch exploit vendor advisory issue tracking |
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-1681-1 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-1681-2 | third party advisory vendor advisory |