Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2010/mfsa2010-40.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/512510 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/41853 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-131/ - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=571106 - Exploit, Issue Tracking | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10958 - Broken Link |
03 Feb 2024, 02:26
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 8.8 |
CPE | cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.6.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0a1pre:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:* |
CWE | CWE-416 CWE-190 |
|
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10958 - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html - Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/41853 - Broken Link, Third Party Advisory, VDB Entry | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/512510 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=571106 - Exploit, Issue Tracking | |
References | (MISC) http://www.zerodayinitiative.com/advisories/ZDI-10-131/ - Third Party Advisory, VDB Entry | |
First Time |
Opensuse opensuse
Suse linux Enterprise Desktop Suse Suse linux Enterprise Server Suse linux Enterprise Software Development Kit Opensuse |
Information
Published : 2010-07-30 20:30
Updated : 2025-04-11 00:51
NVD link : CVE-2010-2753
Mitre link : CVE-2010-2753
CVE.ORG link : CVE-2010-2753
JSON object : View
Products Affected
opensuse
- opensuse
mozilla
- thunderbird
- seamonkey
- firefox
suse
- linux_enterprise_software_development_kit
- linux_enterprise_desktop
- linux_enterprise_server