Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published: 2013-01-13T20:00:00

Updated: 2024-08-06T14:41:47.356Z

Reserved: 2013-01-02T00:00:00

Link: CVE-2013-0756

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2013-01-13T20:55:01.963

Modified: 2020-08-10T21:08:16.433

Link: CVE-2013-0756

cve-icon Redhat

Severity : Critical

Publid Date: 2013-01-08T00:00:00Z

Links: CVE-2013-0756 - Bugzilla