{"vuid":"VU#652366","idnumber":"652366","name":"Mozilla insecurely clones objects and member functions","keywords":["Mozilla","Firefox","netscape","arbitrary script execution","member functions","objects","prototype chain","JavaScript"],"overview":"Mozilla fails to enforce security restrictions on cloned base objects. This may allow a remote attacker to execute arbitrary code on a vulnerable web browser.","clean_desc":"Mozilla supports the use of JavaScript to perform client side scripting. JavaScript uses prototyping as a way to dynamically inherit methods and properties from a superclass. The methods and properties are inherited at runtime via the .prototype property of a subclass. A class hierarchy defined using prototyping is known as a prototype chain. Mozilla insecurely clones base objects in a prototype chain causing an access control vulnerability. A remote attacker with control of an object with few privileges may be able to access methods and properties stored in more privileged base objects higher up the prototype chain. Note that this vulnerability may exist in all Mozilla-based web browsers, including Netscape and Firefox.","impact":"A remote attacker may be able to traverse the prototype chain to access privileged objects. Once access is gained, the attacker may be able to execute arbitrary code with elevated privileges.","resolution":"Upgrade\nThis vulnerability is fixed in Firefox 1.0.5 and Mozilla Suite 1.7.10.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by The Mozilla Foundation. The Mozilla Foundation credits moz_bug_r_a4 and shutdown for reporting this issue.","author":"This document was written by Jeff Gennari.","public":["http://www.mozilla.org/projects/security/known-vulnerabilities.html","http://www.mozilla.org/security/announce/mfsa2005-56.html","http://securitytracker.com/id?1014470","http://www.securityfocus.com/bid/14242","http://secunia.com/advisories/15549/","http://secunia.com/advisories/16059/","http://secunia.com/advisories/16185/"],"cveids":["CVE-2005-2270"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-07-13T18:55:26Z","publicdate":"2005-07-13T00:00:00Z","datefirstpublished":"2005-08-01T19:45:25Z","dateupdated":"2005-08-15T12:49:00Z","revision":72,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"18","cam_impact":"15","cam_easeofexploitation":"7","cam_attackeraccessrequired":"10","cam_scorecurrent":"7.79625","cam_scorecurrentwidelyknown":"9.568125","cam_scorecurrentwidelyknownexploited":"16.655625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.79625,"vulnote":null}