Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2010-2756 | Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers. |
Ubuntu USN |
USN-930-4 | Firefox and Xulrunner vulnerabilities |
Ubuntu USN |
USN-957-1 | Firefox and Xulrunner vulnerabilities |
Ubuntu USN |
USN-958-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T02:46:48.600Z
Reserved: 2010-07-14T00:00:00
Link: CVE-2010-2752
No data.
Status : Deferred
Published: 2010-07-30T20:30:02.393
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-2752
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN