Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-2752

Опубликовано: 20 июл. 2010
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxNot affected
Red Hat Enterprise Linux 4firefoxFixedRHSA-2010:054721.07.2010
Red Hat Enterprise Linux 5firefoxFixedRHSA-2010:054721.07.2010
Red Hat Enterprise Linux 5xulrunnerFixedRHSA-2010:054721.07.2010

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=615464nsCSSValue:: Array index integer overflow

EPSS

Процентиль: 92%
0.08931
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 15 лет назад

Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.

nvd
почти 15 лет назад

Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.

debian
почти 15 лет назад

Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5 ...

github
около 3 лет назад

Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.

oracle-oval
почти 15 лет назад

ELSA-2010-0547: firefox security update (CRITICAL)

EPSS

Процентиль: 92%
0.08931
Низкий

6.8 Medium

CVSS2