mozilla -- javascript "lambda" replace exposes memory contents
Description:
A Mozilla Foundation Security Advisory reports:
A bug in javascript's regular expression string
replacement when using an anonymous function as the
replacement argument allows a malicious script to capture
blocks of memory allocated to the browser. A web site
could capture data and transmit it to a server without
user interaction or knowledge.
Workaround: Disable Javascript
References:
Affects:
- firefox <1.0.3,1
- linux-firefox <1.0.3
- mozilla <1.7.7,2
- mozilla >=1.8.*,2
- linux-mozilla <1.7.7
- linux-mozilla >=1.8.*
- linux-mozilla-devel <1.7.7
- linux-mozilla-devel >=1.8.*
- netscape7 >=0
- de-linux-mozillafirebird >=0
- el-linux-mozillafirebird >=0
- ja-linux-mozillafirebird-gtk1 >=0
- ja-mozillafirebird-gtk2 >=0
- linux-mozillafirebird >=0
- ru-linux-mozillafirebird >=0
- zhCN-linux-mozillafirebird >=0
- zhTW-linux-mozillafirebird >=0
- de-linux-netscape >=0
- de-netscape7 >=0
- fr-linux-netscape >=0
- fr-netscape7 >=0
- ja-linux-netscape >=0
- ja-netscape7 >=0
- linux-netscape >=0
- linux-phoenix >=0
- mozilla+ipv6 >=0
- mozilla-embedded >=0
- mozilla-firebird >=0
- mozilla-gtk1 >=0
- mozilla-gtk2 >=0
- mozilla-gtk >=0
- mozilla-thunderbird >=0
- phoenix >=0
- pt_BR-netscape7 >=0
portaudit: mozilla -- javascript "lambda" replace exposes memory contents
Disclaimer: The data contained on this page is derived from the VuXML document,
please refer to the the original document for copyright information. The author of
portaudit makes no claim of authorship or ownership of any of the information contained herein.
If you have found a vulnerability in a FreeBSD port not listed in the
database, please contact the
FreeBSD Security Officer. Refer to
"FreeBSD Security
Information" for more information.
Oliver Eikemeier <eik@FreeBSD.org>