Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00015.html
http://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html Third Party Advisory
http://pwn2own.zerodayinitiative.com/status.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0387.html
http://rhn.redhat.com/errata/RHSA-2012-0388.html
http://secunia.com/advisories/48359
http://secunia.com/advisories/48402
http://secunia.com/advisories/48414
http://secunia.com/advisories/48495 Third Party Advisory
http://secunia.com/advisories/48496 Third Party Advisory
http://secunia.com/advisories/48513 Third Party Advisory
http://secunia.com/advisories/48553 Third Party Advisory
http://secunia.com/advisories/48561 Third Party Advisory
http://secunia.com/advisories/48624 Third Party Advisory
http://secunia.com/advisories/48629 Third Party Advisory
http://secunia.com/advisories/48823 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:031
http://www.mandriva.com/security/advisories?name=MDVSA-2012:032
http://www.mozilla.org/security/announce/2012/mfsa2012-19.html Vendor Advisory
http://www.securityfocus.com/bid/52465
http://www.securitytracker.com/id?1026801
http://www.securitytracker.com/id?1026803
http://www.securitytracker.com/id?1026804
http://www.ubuntu.com/usn/USN-1400-1
http://www.ubuntu.com/usn/USN-1400-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-1400-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-1400-4 Third Party Advisory
http://www.ubuntu.com/usn/USN-1400-5 Third Party Advisory
http://www.ubuntu.com/usn/USN-1401-1 Third Party Advisory
http://www.zdnet.com/blog/security/mozilla-knew-of-pwn2own-bug-before-cansecwest/10757 Third Party Advisory
http://www.zdnet.com/blog/security/researchers-hack-into-newest-firefox-with-zero-day-flaw/10663 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=720079 Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=735104 Issue Tracking Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14170 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2012-03-14T19:00:00

Updated: 2018-01-17T19:57:01

Reserved: 2012-01-09T00:00:00


Link: CVE-2012-0464

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2012-03-14T19:55:02.337

Modified: 2018-01-18T02:29:05.757


Link: CVE-2012-0464

JSON object: View

cve-icon Redhat Information

No data.

CWE