Short Name |
HTTP:STC:MOZILLA:REDUCE-RIGHT |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Mozilla Multiple Products Array.reduceRight Integer Overflow |
Release Date |
2011/07/05 |
Update Number |
1949 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against multiple Mozilla products. Its due to an integer overflow occurring when the reduceRight() method is called on a JavaScript array with an extremely large length. A successful attack can lead to arbitrary code execution.
Mozilla Firefox, Thunderbird, and SeaMonkey are prone to a remote code-execution vulnerability. The issue occurs when handling a JavaScript array with an extremely large length and can be exploited to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. NOTE: This issue was previously discussed in BID 48354 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2011-19 through -28 Multiple Vulnerabilities) but has been given its own record to better document it.