CVE-2013-1055

The unity-firefox-extension package could be tricked into dropping a C callback which was still in use, which Firefox would then free, causing Firefox to crash. This could be achieved by adding an action to the launcher and updating it with new callbacks until the libunity-webapps rate limit was hit. Fixed in 3.0.0+14.04.20140416-0ubuntu1.14.04.1 of unity-firefox-extension and in all versions of libunity-webapps by shipping an empty unity-firefox-extension package, thus disabling the extension entirely and invalidating the attack against the libunity-webapps package.
References
Link Resource
https://launchpad.net/bugs/1175691 Exploit Vendor Advisory
https://ubuntu.com/USN-2743-3 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:unity-firefox-extension:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-04-07 20:15

Updated : 2024-02-04 21:47


NVD link : CVE-2013-1055

Mitre link : CVE-2013-1055

CVE.ORG link : CVE-2013-1055


JSON object : View

Products Affected

canonical

  • ubuntu_linux
  • unity-firefox-extension
CWE
CWE-404

Improper Resource Shutdown or Release