Multiple vulnerabilities were reported in Mozilla Firefox.
Version(s): prior to 13.0
A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.
A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ]. The code will run with the privileges of the target user.
A remote user can exploit a flaw in the Network Security Services (NSS) ASN.1 QuickDER decoder in the processing zero length items [CVE-2012-0441].
A remote user can exploit a flaw in the Mozilla updater to load a local DLL file ('wsock32.dll') in a privileged context [CVE-2012-1943]. Version 12 on Windows is affected.
A remote user can exploit a flaw in the Mozilla updater service to load an arbitrary local DLL file [CVE-2012-1942]. Version 12 on Windows is affected.
The Content Security Policy's (CSP) inline-script blocking feature may not protect against some inline event handlers [CVE-2012-1944].
A remote user can create an HTML page on a Windows share and Windows shortcut files (.lnk) on the same share that link to arbitrary locations on the target user's local file system. When the HTML page is loaded by the target user, the page can read the contents of the target linked files or directories [CVE-2012-1945].
A remote user can trigger a use-after-free in nsINode::ReplaceOrInsertBefore() when replacing/inserting a node in a document to execute arbitrary code [CVE-2012-1946].
A remote user can trigger a heap overflow in utf16_to_isolatin1() [CVE-2012-1947].
A remote user can trigger a use-after-free in nsFrameList::FirstChild() [CVE-2012-1940].
A remote user can trigger a heap overflow in nsHTMLReflowState::CalculateHypotheticalBox() [CVE-2012-1941].
Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network,
Modification of user information, User access via network
The vendor has issued a fix (13.0).