Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.mozilla.org/security/announce/2010/mfsa2010-39.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/512514 - | |
References | () http://www.securityfocus.com/bid/41852 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-133/ - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=574059 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11680 - |
Information
Published : 2010-07-30 20:30
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2752
Mitre link : CVE-2010-2752
CVE.ORG link : CVE-2010-2752
JSON object : View
Products Affected
mozilla
- seamonkey
- thunderbird
- firefox
CWE
CWE-189
Numeric Errors