Successful exploitation of this vulnerability may result in complete compromise of vulnerable system. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system. The vulnerability exists due to a boundary error in JIT UpdateRegExpStatics when UpdateRegExpStatics attempted to access initialStringHeap. Is there known malware, which exploits this vulnerability? Note, the vulnerability affects Firefox installations on Windows only. Make sure your name and account are correctly specified in the Default Identity. Select your Hotmail account from the list on the left. The Account Settings dialog window will be displayed. A remote attacker can trick the victim to visit a specially crafted website, trigger an integer overflow and execute arbitrary code on the target system. At the top of the Thunderbird window, click on the On the menu bar, click on the Thunderbird menu, choose Edit Tools menu and select Account Settings. The vulnerability exists due to integer overflow in RecordedSourceSurfaceCreation. The vulnerability allows a remote attacker to execute arbitrary code on the target system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |