Endpoint Vulnerability

Address space layout leaked in XBL objects

Description

Mozilla security researcher Jesse Ruderman discovered that using the toString function of XBL objects can lead to inappropriate information leakage by revealing the address space layout instead of just the ID of the object. This layout information could potentially be used to bypass ASLR and other security protections.

Affected Products

SeaMonkey

References

CVE-2013-0748,