The unity-firefox-extension package could be tricked into dropping a C callback which was still in use, which Firefox would then free, causing Firefox to crash. This could be achieved by adding an action to the launcher and updating it with new callbacks until the libunity-webapps rate limit was hit. Fixed in 3.0.0+14.04.20140416-0ubuntu1.14.04.1 of unity-firefox-extension and in all versions of libunity-webapps by shipping an empty unity-firefox-extension package, thus disabling the extension entirely and invalidating the attack against the libunity-webapps package.
References
Link | Resource |
---|---|
https://launchpad.net/bugs/1175691 | Exploit Vendor Advisory |
https://ubuntu.com/USN-2743-3 | Vendor Advisory |
https://launchpad.net/bugs/1175691 | Exploit Vendor Advisory |
https://ubuntu.com/USN-2743-3 | Vendor Advisory |
Configurations
History
21 Nov 2024, 01:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.net/bugs/1175691 - Exploit, Vendor Advisory | |
References | () https://ubuntu.com/USN-2743-3 - Vendor Advisory |
Information
Published : 2021-04-07 20:15
Updated : 2024-11-21 01:48
NVD link : CVE-2013-1055
Mitre link : CVE-2013-1055
CVE.ORG link : CVE-2013-1055
JSON object : View
Products Affected
canonical
- ubuntu_linux
- unity-firefox-extension
CWE
CWE-404
Improper Resource Shutdown or Release