CVE-2010-1198

Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html
http://secunia.com/advisories/40326
http://secunia.com/advisories/40401
http://secunia.com/advisories/40481
http://support.avaya.com/css/P8/documents/100091069
http://ubuntu.com/usn/usn-930-1
http://www.mandriva.com/security/advisories?name=MDVSA-2010:125
http://www.mozilla.org/security/announce/2010/mfsa2010-28.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0499.html
http://www.redhat.com/support/errata/RHSA-2010-0500.html
http://www.redhat.com/support/errata/RHSA-2010-0501.html
http://www.securityfocus.com/bid/41050
http://www.securityfocus.com/bid/41102
http://www.securitytracker.com/id?1024138
http://www.ubuntu.com/usn/usn-930-2
http://www.vupen.com/english/advisories/2010/1551
http://www.vupen.com/english/advisories/2010/1556
http://www.vupen.com/english/advisories/2010/1557
http://www.vupen.com/english/advisories/2010/1592
http://www.vupen.com/english/advisories/2010/1640
http://www.vupen.com/english/advisories/2010/1773
https://bugzilla.mozilla.org/show_bug.cgi?id=532246
https://exchange.xforce.ibmcloud.com/vulnerabilities/59664
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10990
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14176
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html
http://secunia.com/advisories/40326
http://secunia.com/advisories/40401
http://secunia.com/advisories/40481
http://support.avaya.com/css/P8/documents/100091069
http://ubuntu.com/usn/usn-930-1
http://www.mandriva.com/security/advisories?name=MDVSA-2010:125
http://www.mozilla.org/security/announce/2010/mfsa2010-28.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0499.html
http://www.redhat.com/support/errata/RHSA-2010-0500.html
http://www.redhat.com/support/errata/RHSA-2010-0501.html
http://www.securityfocus.com/bid/41050
http://www.securityfocus.com/bid/41102
http://www.securitytracker.com/id?1024138
http://www.ubuntu.com/usn/usn-930-2
http://www.vupen.com/english/advisories/2010/1551
http://www.vupen.com/english/advisories/2010/1556
http://www.vupen.com/english/advisories/2010/1557
http://www.vupen.com/english/advisories/2010/1592
http://www.vupen.com/english/advisories/2010/1640
http://www.vupen.com/english/advisories/2010/1773
https://bugzilla.mozilla.org/show_bug.cgi?id=532246
https://exchange.xforce.ibmcloud.com/vulnerabilities/59664
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10990
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14176
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:13

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html -
References () http://secunia.com/advisories/40326 - () http://secunia.com/advisories/40326 -
References () http://secunia.com/advisories/40401 - () http://secunia.com/advisories/40401 -
References () http://secunia.com/advisories/40481 - () http://secunia.com/advisories/40481 -
References () http://support.avaya.com/css/P8/documents/100091069 - () http://support.avaya.com/css/P8/documents/100091069 -
References () http://ubuntu.com/usn/usn-930-1 - () http://ubuntu.com/usn/usn-930-1 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:125 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:125 -
References () http://www.mozilla.org/security/announce/2010/mfsa2010-28.html - Vendor Advisory () http://www.mozilla.org/security/announce/2010/mfsa2010-28.html - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2010-0499.html - () http://www.redhat.com/support/errata/RHSA-2010-0499.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0500.html - () http://www.redhat.com/support/errata/RHSA-2010-0500.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0501.html - () http://www.redhat.com/support/errata/RHSA-2010-0501.html -
References () http://www.securityfocus.com/bid/41050 - () http://www.securityfocus.com/bid/41050 -
References () http://www.securityfocus.com/bid/41102 - () http://www.securityfocus.com/bid/41102 -
References () http://www.securitytracker.com/id?1024138 - () http://www.securitytracker.com/id?1024138 -
References () http://www.ubuntu.com/usn/usn-930-2 - () http://www.ubuntu.com/usn/usn-930-2 -
References () http://www.vupen.com/english/advisories/2010/1551 - () http://www.vupen.com/english/advisories/2010/1551 -
References () http://www.vupen.com/english/advisories/2010/1556 - () http://www.vupen.com/english/advisories/2010/1556 -
References () http://www.vupen.com/english/advisories/2010/1557 - () http://www.vupen.com/english/advisories/2010/1557 -
References () http://www.vupen.com/english/advisories/2010/1592 - () http://www.vupen.com/english/advisories/2010/1592 -
References () http://www.vupen.com/english/advisories/2010/1640 - () http://www.vupen.com/english/advisories/2010/1640 -
References () http://www.vupen.com/english/advisories/2010/1773 - () http://www.vupen.com/english/advisories/2010/1773 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=532246 - () https://bugzilla.mozilla.org/show_bug.cgi?id=532246 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/59664 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/59664 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10990 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10990 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14176 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14176 -

Information

Published : 2010-06-24 12:30

Updated : 2024-11-21 01:13


NVD link : CVE-2010-1198

Mitre link : CVE-2010-1198

CVE.ORG link : CVE-2010-1198


JSON object : View

Products Affected

mozilla

  • firefox
  • seamonkey
CWE
CWE-399

Resource Management Errors