Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
References
Link | Resource |
---|---|
http://www.mozilla.org/security/announce/2010/mfsa2010-35.html | Vendor Advisory |
http://www.securityfocus.com/archive/1/512515 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/41849 | Broken Link Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-10-134/ | Third Party Advisory VDB Entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=572986 | Issue Tracking Patch |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11740 | Broken Link |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2010-07-30T20:00:00
Updated: 2017-09-18T12:57:01
Reserved: 2010-03-30T00:00:00
Link: CVE-2010-1208
JSON object: View
NVD Information
Status : Analyzed
Published: 2010-07-30T20:30:01.393
Modified: 2024-02-02T16:10:03.047
Link: CVE-2010-1208
JSON object: View
Redhat Information
No data.
CWE