Description
Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
Published: 2010-10-21
Score: 9.3 Critical
EPSS: 22.6% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2124-1 New Xulrunner packages fix several vulnerabilities
Ubuntu USN Ubuntu USN USN-997-1 Firefox and Xulrunner vulnerabilities
Ubuntu USN Ubuntu USN USN-998-1 Thunderbird vulnerabilities
History

No history.

Subscriptions

Mozilla Firefox Seamonkey Thunderbird
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T03:03:18.236Z

Reserved: 2010-08-27T00:00:00.000Z

Link: CVE-2010-3179

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-10-21T19:00:03.237

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-3179

cve-icon Redhat

Severity : Critical

Publid Date: 2010-10-19T00:00:00Z

Links: CVE-2010-3179 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses