Arbitrary code execution vulnerability in Mozilla products via a crafted JavaScript - MFSA-2015-29 (Mac OS X)ID: oval:org.secpod.oval:def:23971 | Date: (C)2015-03-30 (M)2023-12-07 |
Class: PATCH | Family: macos |
The host is missing a critical security update according to Mozilla advisory, MFSA-2015-29. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the applications, which do not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access. Successful exploitation could allow attackers to read or write to unintended memory locations, and consequently execute arbitrary code.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Product: |
Mozilla Firefox ESR |
Mozilla Firefox |
Mozilla SeaMonkey |