Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2075-1 | New xulrunner packages fix several vulnerabilities |
Ubuntu USN |
USN-930-4 | Firefox and Xulrunner vulnerabilities |
Ubuntu USN |
USN-957-1 | Firefox and Xulrunner vulnerabilities |
Ubuntu USN |
USN-958-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T02:46:48.173Z
Reserved: 2010-07-14T00:00:00
Link: CVE-2010-2753
No data.
Status : Deferred
Published: 2010-07-30T20:30:02.427
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-2753
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN