Mozilla SeaMonkey CVE-2015-0817 Request Smuggling Vulnerability

description-logoDescription

Security researcher ilxu1a reported, through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's implementation of typed array bounds checking in JavaScript just-in-time compilation (JIT) and its management of bounds checking for heap access. This flaw can be leveraged into the reading and writing of memory allowing for arbitary code execution on the local system.

affected-products-logoAffected Applications

SeaMonkey

CVE References

CVE-2015-0817