A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Thunderbird < 52.5.2, Firefox ESR < 52.5.2, and Firefox < 57.0.2.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2017-28/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2017-29/ | vendor advisory |
http://www.securitytracker.com/id/1040123 | third party advisory vdb entry |
https://www.mozilla.org/security/advisories/mfsa2017-30/ | vendor advisory |
http://www.securityfocus.com/bid/102115 | third party advisory vdb entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=1402372 | issue tracking permissions required |