Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html | Mailing List Third Party Advisory |
http://www.mozilla.org/security/announce/2010/mfsa2010-40.html | Vendor Advisory |
http://www.securityfocus.com/archive/1/512510 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/41853 | Broken Link Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-10-131/ | Third Party Advisory VDB Entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=571106 | Exploit Issue Tracking |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10958 | Broken Link |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2010-07-30T20:00:00
Updated: 2017-09-18T12:57:01
Reserved: 2010-07-14T00:00:00
Link: CVE-2010-2753
JSON object: View
NVD Information
Status : Analyzed
Published: 2010-07-30T20:30:02.427
Modified: 2024-02-03T02:26:59.793
Link: CVE-2010-2753
JSON object: View
Redhat Information
No data.