Vulnerability Note VU#393921

Mozilla Firefox fails to properly handle JavaScript onUnload events

Original Release date: 23 Feb 2007 | Last revised: 07 Mar 2007

Overview

Mozilla Firefox does not properly handle JavaScript onUnload events. This vulnerability may lead to memory corruption that could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

The JavaScript onUnload event is executed when the browser exits a web page. An event handler can be installed via JavaScript to trap and process this event.

Mozilla Firefox fails to properly handle JavaScript onUnload events. Specifically, Firefox may not correctly handle freed data structures modified in the onUnload event handler, which could cause memory corruption.

Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.

Solution

Upgrade
Firefox has addressed this issue in Firefox version 2.0.0.2 as well as Firefox 1.5.0.10. See Mozilla Foundation Security Advisory 2007-08 for more information

Disable JavaScript


Disabling JavaScript will prevent exploitation of this vulnerability. For instructions on disabling JavaScript in Mozilla Firefox, refer to the Mozilla Firefox section the Securing Your Web Browser document.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MozillaAffected-26 Feb 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was publicly disclosed by Michal Zalewski.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2007-1092
  • Date Public: 22 Feb 2007
  • Date First Published: 23 Feb 2007
  • Date Last Updated: 07 Mar 2007
  • Severity Metric: 18.36
  • Document Revision: 27

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.