Lucene search

K
cve[email protected]CVE-2010-3765
HistoryOct 28, 2010 - 12:00 a.m.

CVE-2010-3765

2010-10-2800:00:05
CWE-119
web.nvd.nist.gov
64
cve-2010-3765
mozilla
firefox
thunderbird
seamonkey
javascript
remote execution
arbitrary code
memory corruption
belmoo malware
nvd

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9.4 High

AI Score

Confidence

High

0.967 High

EPSS

Percentile

99.7%

Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.

Affected configurations

NVD
Node
mozillafirefoxMatch3.5
OR
mozillafirefoxMatch3.5.1
OR
mozillafirefoxMatch3.5.2
OR
mozillafirefoxMatch3.5.3
OR
mozillafirefoxMatch3.5.4
OR
mozillafirefoxMatch3.5.5
OR
mozillafirefoxMatch3.5.6
OR
mozillafirefoxMatch3.5.7
OR
mozillafirefoxMatch3.5.8
OR
mozillafirefoxMatch3.5.9
OR
mozillafirefoxMatch3.5.10
OR
mozillafirefoxMatch3.5.11
OR
mozillafirefoxMatch3.5.12
OR
mozillafirefoxMatch3.5.13
OR
mozillafirefoxMatch3.5.14
Node
mozillafirefoxMatch3.6
OR
mozillafirefoxMatch3.6.2
OR
mozillafirefoxMatch3.6.3
OR
mozillafirefoxMatch3.6.4
OR
mozillafirefoxMatch3.6.6
OR
mozillafirefoxMatch3.6.7
OR
mozillafirefoxMatch3.6.8
OR
mozillafirefoxMatch3.6.9
OR
mozillafirefoxMatch3.6.10
OR
mozillafirefoxMatch3.6.11
Node
mozillathunderbirdMatch3.0.1
OR
mozillathunderbirdMatch3.0.2
OR
mozillathunderbirdMatch3.0.3
OR
mozillathunderbirdMatch3.0.4
OR
mozillathunderbirdMatch3.0.5
OR
mozillathunderbirdMatch3.0.6
OR
mozillathunderbirdMatch3.0.7
OR
mozillathunderbirdMatch3.0.8
OR
mozillathunderbirdMatch3.0.9
OR
mozillathunderbirdMatch3.1.1
OR
mozillathunderbirdMatch3.1.2
OR
mozillathunderbirdMatch3.1.3
OR
mozillathunderbirdMatch3.1.4
OR
mozillathunderbirdMatch3.1.5
Node
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0rc2
OR
mozillaseamonkeyMatch2.0.1
OR
mozillaseamonkeyMatch2.0.2
OR
mozillaseamonkeyMatch2.0.3
OR
mozillaseamonkeyMatch2.0.4
OR
mozillaseamonkeyMatch2.0.5
OR
mozillaseamonkeyMatch2.0.6
OR
mozillaseamonkeyMatch2.0.7
OR
mozillaseamonkeyMatch2.0.8
OR
mozillaseamonkeyMatch2.0.9

References

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9.4 High

AI Score

Confidence

High

0.967 High

EPSS

Percentile

99.7%