Overview
Mozilla products are vulnerable to memory corruption via simultaneous XPCOM events. This may allow a remote attacker to execute arbitrary code on a vulnerable system.
Description
| XPCOM XPCOM is a cross-platform component object model similar to Microsoft COM or CORBA.  XPCOM provides the following features to software developers: 
 XPCOM events that occur simultaneously can trigger the use of a deleted timer object, which can cause memory corruption. | 
Impact
| A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. The attacker could also cause the vulnerable application to crash. | 
Solution
| Apply an update | 
| 
 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
- http://www.mozilla.org/security/announce/2006/mfsa2006-46.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=342507
- https://bugzilla.mozilla.org/show_bug.cgi?id=320982
- http://secunia.com/advisories/19873/
- http://secunia.com/advisories/21216/
- http://secunia.com/secunia_research/2006-53/
- https://issues.rpath.com/browse/RPL-537
- http://www.securityfocus.com/bid/19181
Acknowledgements
This vulnerability was reported by the Mozilla Foundation, who in turn credit Secunia Research.
This document was written by Will Dormann.
Other Information
| CVE IDs: | CVE-2006-3113 | 
| Severity Metric: | 7.83 | 
| Date Public: | 2006-07-25 | 
| Date First Published: | 2006-07-27 | 
| Date Last Updated: | 2007-02-09 14:06 UTC | 
| Document Revision: | 11 |