The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035346.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035367.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035426.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036097.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036132.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00001.html Mailing List Third Party Advisory
http://secunia.com/advisories/37242 Third Party Advisory
http://secunia.com/advisories/38770 Third Party Advisory
http://secunia.com/advisories/38772 Third Party Advisory
http://secunia.com/advisories/38847 Third Party Advisory
http://www.debian.org/security/2010/dsa-1999 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:042 Third Party Advisory
http://www.mozilla.org/security/announce/2010/mfsa2010-01.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0112.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0113.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0153.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0154.html Third Party Advisory
http://www.ubuntu.com/usn/USN-895-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-896-1 Third Party Advisory
http://www.vupen.com/english/advisories/2010/0405 Third Party Advisory
http://www.vupen.com/english/advisories/2010/0650 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=467005 Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=501934 Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=527567 Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=528134 Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=528300 Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=530880 Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=534082 Issue Tracking Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/56359 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8485 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9590 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2010-02-21T17:00:00

Updated: 2017-09-18T12:57:01

Reserved: 2010-01-06T00:00:00


Link: CVE-2010-0159

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2010-02-22T13:00:02.000

Modified: 2018-11-16T15:56:41.103


Link: CVE-2010-0159

JSON object: View

cve-icon Redhat Information

No data.