Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2027-1 | New xulrunner packages fix several vulnerabilities |
EUVD |
EUVD-2010-0207 | Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability." |
Ubuntu USN |
USN-920-1 | Firefox 3.0 and Xulrunner vulnerabilities |
Ubuntu USN |
USN-921-1 | Firefox 3.5 and Xulrunner vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T00:37:53.927Z
Reserved: 2010-01-06T00:00:00
Link: CVE-2010-0176
No data.
Status : Deferred
Published: 2010-04-05T17:30:00.453
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-0176
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN