Описание
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Not affected | ||
Red Hat Enterprise Linux Extended Update Support 4.8 | seamonkey | Affected | ||
Red Hat Enterprise Linux 3 | seamonkey | Fixed | RHSA-2010:0546 | 21.07.2010 |
Red Hat Enterprise Linux 4 | thunderbird | Fixed | RHSA-2010:0544 | 21.07.2010 |
Red Hat Enterprise Linux 4 | seamonkey | Fixed | RHSA-2010:0546 | 21.07.2010 |
Red Hat Enterprise Linux 4 | firefox | Fixed | RHSA-2010:0547 | 21.07.2010 |
Red Hat Enterprise Linux 5 | thunderbird | Fixed | RHSA-2010:0545 | 21.07.2010 |
Red Hat Enterprise Linux 5 | firefox | Fixed | RHSA-2010:0547 | 21.07.2010 |
Red Hat Enterprise Linux 5 | xulrunner | Fixed | RHSA-2010:0547 | 21.07.2010 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x befo ...
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
EPSS
6.8 Medium
CVSS2