CVE-2010-1121

Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
References
Link Resource
http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html
http://news.cnet.com/8301-27080_3-20001126-245.html
http://secunia.com/advisories/40323 Vendor Advisory
http://secunia.com/advisories/40326 Vendor Advisory
http://secunia.com/advisories/40401 Vendor Advisory
http://secunia.com/advisories/40481 Vendor Advisory
http://support.avaya.com/css/P8/documents/100091069
http://twitter.com/thezdi/statuses/11005277222
http://ubuntu.com/usn/usn-930-1
http://www.mozilla.org/security/announce/2010/mfsa2010-25.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0500.html
http://www.redhat.com/support/errata/RHSA-2010-0501.html
http://www.securitytracker.com/id?1023817
http://www.ubuntu.com/usn/usn-930-2
http://www.vupen.com/english/advisories/2010/1557 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1592
http://www.vupen.com/english/advisories/2010/1640 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1773 Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=555109
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10924
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6844
http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html
http://news.cnet.com/8301-27080_3-20001126-245.html
http://secunia.com/advisories/40323 Vendor Advisory
http://secunia.com/advisories/40326 Vendor Advisory
http://secunia.com/advisories/40401 Vendor Advisory
http://secunia.com/advisories/40481 Vendor Advisory
http://support.avaya.com/css/P8/documents/100091069
http://twitter.com/thezdi/statuses/11005277222
http://ubuntu.com/usn/usn-930-1
http://www.mozilla.org/security/announce/2010/mfsa2010-25.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0500.html
http://www.redhat.com/support/errata/RHSA-2010-0501.html
http://www.securitytracker.com/id?1023817
http://www.ubuntu.com/usn/usn-930-2
http://www.vupen.com/english/advisories/2010/1557 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1592
http://www.vupen.com/english/advisories/2010/1640 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1773 Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=555109
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10924
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6844
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:13

Type Values Removed Values Added
References () http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010 - () http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010 -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html -
References () http://news.cnet.com/8301-27080_3-20001126-245.html - () http://news.cnet.com/8301-27080_3-20001126-245.html -
References () http://secunia.com/advisories/40323 - Vendor Advisory () http://secunia.com/advisories/40323 - Vendor Advisory
References () http://secunia.com/advisories/40326 - Vendor Advisory () http://secunia.com/advisories/40326 - Vendor Advisory
References () http://secunia.com/advisories/40401 - Vendor Advisory () http://secunia.com/advisories/40401 - Vendor Advisory
References () http://secunia.com/advisories/40481 - Vendor Advisory () http://secunia.com/advisories/40481 - Vendor Advisory
References () http://support.avaya.com/css/P8/documents/100091069 - () http://support.avaya.com/css/P8/documents/100091069 -
References () http://twitter.com/thezdi/statuses/11005277222 - () http://twitter.com/thezdi/statuses/11005277222 -
References () http://ubuntu.com/usn/usn-930-1 - () http://ubuntu.com/usn/usn-930-1 -
References () http://www.mozilla.org/security/announce/2010/mfsa2010-25.html - Vendor Advisory () http://www.mozilla.org/security/announce/2010/mfsa2010-25.html - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2010-0500.html - () http://www.redhat.com/support/errata/RHSA-2010-0500.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0501.html - () http://www.redhat.com/support/errata/RHSA-2010-0501.html -
References () http://www.securitytracker.com/id?1023817 - () http://www.securitytracker.com/id?1023817 -
References () http://www.ubuntu.com/usn/usn-930-2 - () http://www.ubuntu.com/usn/usn-930-2 -
References () http://www.vupen.com/english/advisories/2010/1557 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1557 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1592 - () http://www.vupen.com/english/advisories/2010/1592 -
References () http://www.vupen.com/english/advisories/2010/1640 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1640 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1773 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1773 - Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=555109 - () https://bugzilla.mozilla.org/show_bug.cgi?id=555109 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10924 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10924 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6844 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6844 -

Information

Published : 2010-03-25 21:00

Updated : 2024-11-21 01:13


NVD link : CVE-2010-1121

Mitre link : CVE-2010-1121

CVE.ORG link : CVE-2010-1121


JSON object : View

Products Affected

mozilla

  • firefox
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')