Hide Forgot
Google security researcher Abhishek Arya used the Address Sanitizer tool to uncover four issues: two use-after-free problems, one out of bounds read bug, and a bad cast. The first use-after-free problem is caused when an array of nsSMILTimeValueSpec objects is destroyed but attempts are made to call into objects in this array later. The second use-after-free problem is in nsDocument::AdoptNode when it adopts into an empty document and then adopts into another document, emptying the first one. The heap buffer overflow is in ElementAnimations when data is read off of end of an array and then pointers are dereferenced. The bad cast happens when nsTableFrame::InsertFrames is called with frames in aFrameList that are a mix of row group frames and column group frames. AppendFrames is not able to handle this mix. All four of these issues are potentially exploitable. References: http://www.mozilla.org/security/announce/2012/mfsa2012-44.html Heap-use-after-free in nsSMILTimeValueSpec::IsEventBased: https://bugzilla.mozilla.org/show_bug.cgi?id=752902 Heap-use-after-free in nsDocument::AdoptNode: https://bugzilla.mozilla.org/show_bug.cgi?id=765139 Out of bounds read in ElementAnimations::EnsureStyleRuleFor: https://bugzilla.mozilla.org/show_bug.cgi?id=765218 Bad cast in nsTableFrame::InsertFrames: https://bugzilla.mozilla.org/show_bug.cgi?id=759249 Acknowledgements: Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Google security researcher Abhishek Arya as the original reporter of this issue.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2012:1089 https://rhn.redhat.com/errata/RHSA-2012-1089.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2012:1088 https://rhn.redhat.com/errata/RHSA-2012-1088.html