Описание
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Not affected | ||
Red Hat Enterprise Linux Extended Update Support 4.8 | seamonkey | Affected | ||
Red Hat Enterprise Linux 3 | seamonkey | Fixed | RHSA-2010:0546 | 21.07.2010 |
Red Hat Enterprise Linux 4 | thunderbird | Fixed | RHSA-2010:0544 | 21.07.2010 |
Red Hat Enterprise Linux 4 | seamonkey | Fixed | RHSA-2010:0546 | 21.07.2010 |
Red Hat Enterprise Linux 4 | firefox | Fixed | RHSA-2010:0547 | 21.07.2010 |
Red Hat Enterprise Linux 5 | thunderbird | Fixed | RHSA-2010:0545 | 21.07.2010 |
Red Hat Enterprise Linux 5 | firefox | Fixed | RHSA-2010:0547 | 21.07.2010 |
Red Hat Enterprise Linux 5 | xulrunner | Fixed | RHSA-2010:0547 | 21.07.2010 |
Показывать по
Дополнительная информация
Статус:
6.8 Medium
CVSS2
Связанные уязвимости
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x befo ...
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
6.8 Medium
CVSS2