Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html | Mailing List Third Party Advisory |
http://www.mozilla.org/security/announce/2010/mfsa2010-40.html | Vendor Advisory |
http://www.securityfocus.com/archive/1/512510 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/41853 | Broken Link Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-10-131/ | Third Party Advisory VDB Entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=571106 | Exploit Issue Tracking |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10958 | Broken Link |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2010-07-30 20:30
Updated : 2024-02-03 02:26
NVD link : CVE-2010-2753
Mitre link : CVE-2010-2753
CVE.ORG link : CVE-2010-2753
JSON object : View
Products Affected
mozilla
- seamonkey
- thunderbird
- firefox
opensuse
- opensuse
suse
- linux_enterprise_server
- linux_enterprise_software_development_kit
- linux_enterprise_desktop