CVE-2010-2753
30.07.2010, 20:30
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.Enginsight
| Vendor | Product | Version |
|---|---|---|
| mozilla | firefox | 3.5 ≤ 𝑥 < 3.5.11 |
| mozilla | firefox | 3.6 ≤ 𝑥 < 3.6.7 |
| mozilla | seamonkey | 𝑥 < 2.0.6 |
| mozilla | thunderbird | 3.0 ≤ 𝑥 < 3.0.6 |
| mozilla | thunderbird | 3.1 |
| opensuse | opensuse | 11.1 |
| opensuse | opensuse | 11.2 |
| opensuse | opensuse | 11.3 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| firefox |
| ||||||||||||||
| firefox-3.0 |
| ||||||||||||||
| firefox-3.5 |
| ||||||||||||||
| thunderbird |
| ||||||||||||||
| xulrunner-1.9.2 |
|
References