[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Mozilla Products: Potential overflow in JavaScript binary search algorithms - mfsa2013-110

ID: oval:org.secpod.oval:def:16244Date: (C)2013-12-20   (M)2023-11-18
Class: PATCHFamily: macos




Compiler Engineer Dan Gohman of Google reported that binary search algorithms in the SpiderMonkey JavaScript engine were prone to overflow in several places, leading to potential out-of-bounds array access. While none of these are known to be directly exploitable, they are unsafe in theory and have been changed as part of general security improvements.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.13
Apple Mac OS X 10.11
Apple Mac OS X 10.12
Product:
Mozilla SeaMonkey
Mozilla Firefox
Reference:
MFSA 2013-110
CVE-2013-5619
CVE    1
CVE-2013-5619
CPE    371
cpe:/a:mozilla:firefox:14.0
cpe:/a:mozilla:seamonkey:2.21:beta1
cpe:/a:mozilla:seamonkey:2.21:beta2
cpe:/a:mozilla:firefox:20.0.1
...

© SecPod Technologies