Mozilla Firefox before 41.0 allows remote attackers to bypass certain ECMAScript 5 (aka ES5) API protection mechanisms and modify immutable properties, and consequently execute arbitrary JavaScript code with chrome privileges, via a crafted web page that does not use ES5 APIs.
Vulnerabilidad en Mozilla Firefox en versiones anteriores a 41.0, permite a atacantes remotos eludir ciertos mecanismos de protección de la API ECMAScript 5 (también conocido como ES5) y modificar propiedades inmutables y, consecuentemente, ejecutar código JavaScript arbitario con privilegios de chrome a través de una página web manipulada que no utiliza las APIs ES5.
USN-2743-1 fixed vulnerabilities in Firefox. After upgrading, some users reported problems with bookmark creation and crashes in some circumstances. This update fixes the problem. Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David Major, Andrew McCreight, Cameron McCormack, Bob Clary and Randell Jesup discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Various other issues were also addressed.