Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-2373

Опубликовано: 21 июн. 2011
Источник: redhat
CVSS2: 6.8

Описание

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6thunderbirdAffected
Red Hat Enterprise Linux 4firefoxFixedRHSA-2011:088521.06.2011
Red Hat Enterprise Linux 4thunderbirdFixedRHSA-2011:088721.06.2011
Red Hat Enterprise Linux 4seamonkeyFixedRHSA-2011:088821.06.2011
Red Hat Enterprise Linux 5firefoxFixedRHSA-2011:088521.06.2011
Red Hat Enterprise Linux 5xulrunnerFixedRHSA-2011:088521.06.2011
Red Hat Enterprise Linux 5thunderbirdFixedRHSA-2011:088721.06.2011
Red Hat Enterprise Linux 6firefoxFixedRHSA-2011:088521.06.2011
Red Hat Enterprise Linux 6xulrunnerFixedRHSA-2011:088521.06.2011

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=714577Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.

nvd
почти 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.

debian
почти 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x ...

github
около 3 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.

oracle-oval
около 14 лет назад

ELSA-2011-0885: firefox security and bug fix update (CRITICAL)

6.8 Medium

CVSS2