Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-3769

Опубликовано: 10 дек. 2010
Источник: debian
EPSS Низкий

Описание

The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xulrunnerremovedpackage
icedovefixed3.0.11-1package
iceweaselfixed3.5.16-1package
iceweaselnot-affectedlennypackage
iceapefixed2.0.11-1package
iceapenot-affectedlennypackage
xulrunnernot-affectedlennypackage

Примечания

  • xulrunner in wheezy is not covered by security support

EPSS

Процентиль: 91%
0.06622
Низкий

Связанные уязвимости

ubuntu
около 15 лет назад

The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.

nvd
около 15 лет назад

The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.

github
больше 3 лет назад

The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.

EPSS

Процентиль: 91%
0.06622
Низкий