Bug 840205 (CVE-2012-1951, CVE-2012-1952, CVE-2012-1953, CVE-2012-1954) - CVE-2012-1951 CVE-2012-1952 CVE-2012-1953 CVE-2012-1954 Mozilla: Gecko memory corruption (MFSA 2012-44)
Summary: CVE-2012-1951 CVE-2012-1952 CVE-2012-1953 CVE-2012-1954 Mozilla: Gecko memory...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-1951, CVE-2012-1952, CVE-2012-1953, CVE-2012-1954
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 835033
TreeView+ depends on / blocked
 
Reported: 2012-07-14 11:37 UTC by Huzaifa S. Sidhpurwala
Modified: 2023-05-11 19:15 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-07-18 07:30:59 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:1088 0 normal SHIPPED_LIVE Critical: firefox security update 2012-07-17 23:26:50 UTC
Red Hat Product Errata RHSA-2012:1089 0 normal SHIPPED_LIVE Critical: thunderbird security update 2012-07-17 22:56:27 UTC

Description Huzaifa S. Sidhpurwala 2012-07-14 11:37:46 UTC
Google security researcher Abhishek Arya used the Address Sanitizer tool to uncover four issues: two use-after-free problems, one out of bounds read bug, and a bad cast. The first use-after-free problem is caused when an array of nsSMILTimeValueSpec objects is destroyed but attempts are made to call into objects in this array later. The second use-after-free problem is in nsDocument::AdoptNode when it adopts into an empty document and then adopts into another document, emptying the first one. The heap buffer overflow is in ElementAnimations when data is read off of end of an array and then pointers are dereferenced. The bad cast happens when nsTableFrame::InsertFrames is called with frames in aFrameList that are a mix of row group frames and column group frames. AppendFrames is not able to handle this mix.

All four of these issues are potentially exploitable. 

References:
http://www.mozilla.org/security/announce/2012/mfsa2012-44.html

Heap-use-after-free in nsSMILTimeValueSpec::IsEventBased:
https://bugzilla.mozilla.org/show_bug.cgi?id=752902

Heap-use-after-free in nsDocument::AdoptNode:
https://bugzilla.mozilla.org/show_bug.cgi?id=765139

Out of bounds read in ElementAnimations::EnsureStyleRuleFor:
https://bugzilla.mozilla.org/show_bug.cgi?id=765218

Bad cast in nsTableFrame::InsertFrames:
https://bugzilla.mozilla.org/show_bug.cgi?id=759249

Acknowledgements:

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Google security researcher Abhishek Arya as the original reporter of this issue.

Comment 1 errata-xmlrpc 2012-07-17 18:57:40 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2012:1089 https://rhn.redhat.com/errata/RHSA-2012-1089.html

Comment 2 errata-xmlrpc 2012-07-17 19:28:04 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2012:1088 https://rhn.redhat.com/errata/RHSA-2012-1088.html


Note You need to log in before you can comment on or make changes to this bug.