First published: Thu Jun 30 2011(Updated: )
The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict read operations, which allows remote attackers to obtain sensitive information from GPU memory associated with an arbitrary process, or cause a denial of service (application crash), via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =4.0-beta6 | |
Mozilla Firefox | =4.0-beta1 | |
Mozilla Firefox | =4.0-beta9 | |
Mozilla Firefox | =4.0-beta5 | |
Mozilla Firefox | =4.0-beta8 | |
Mozilla Firefox | =4.0-beta12 | |
Mozilla Firefox | =4.0-beta3 | |
Mozilla Firefox | =4.0-beta2 | |
Mozilla Firefox | =4.0-beta4 | |
Mozilla Firefox | =4.0-beta10 | |
Mozilla Firefox | =4.0 | |
Mozilla Firefox | =4.0-beta11 | |
Mozilla Firefox | =4.0-beta7 | |
Mozilla Firefox | =4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2367 has a severity rating of high due to its potential to disclose sensitive information and cause application crashes.
To mitigate CVE-2011-2367, update Mozilla Firefox to a version higher than 4.0.1.
CVE-2011-2367 affects Mozilla Firefox versions 4.0, 4.0.1, and all beta versions from 4.0-beta1 to 4.0-beta12.
CVE-2011-2367 can facilitate attacks that lead to sensitive information disclosure from GPU memory and cause denial of service.
Yes, CVE-2011-2367 is specifically associated with vulnerabilities in the WebGL implementation of Mozilla Firefox.