Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
2010-07-30T20:30:02.427
2025-04-11T00:51:21.963
Deferred
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mozilla | firefox | < 3.5.11 | Yes |
Application | mozilla | firefox | < 3.6.7 | Yes |
Application | mozilla | seamonkey | < 2.0.6 | Yes |
Application | mozilla | thunderbird | < 3.0.6 | Yes |
Application | mozilla | thunderbird | 3.1 | Yes |
Operating System | opensuse | opensuse | 11.1 | Yes |
Operating System | opensuse | opensuse | 11.2 | Yes |
Operating System | opensuse | opensuse | 11.3 | Yes |
Operating System | suse | linux_enterprise_desktop | 11 | Yes |
Operating System | suse | linux_enterprise_desktop | 11 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |
Operating System | suse | linux_enterprise_software_development_kit | 11 | Yes |
Operating System | suse | linux_enterprise_software_development_kit | 11 | Yes |