CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
95.3%
Use-after-free vulnerability in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via vectors involving a change to an nsDOMAttribute node.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | firefox | 3.6 | cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:* |
mozilla | firefox | 3.6.2 | cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:* |
mozilla | firefox | 3.6.3 | cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:* |
mozilla | firefox | 3.6.4 | cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:* |
mozilla | firefox | 3.6.6 | cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:* |
mozilla | firefox | 3.6.7 | cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:* |
mozilla | firefox | 3.6.8 | cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:* |
mozilla | firefox | 3.6.9 | cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:* |
mozilla | firefox | 3.6.10 | cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:* |
mozilla | firefox | 3.6.11 | cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2010-December/052022.html
lists.fedoraproject.org/pipermail/package-announce/2010-December/052032.html
lists.fedoraproject.org/pipermail/package-announce/2010-December/052502.html
lists.fedoraproject.org/pipermail/package-announce/2010-December/052504.html
lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html
secunia.com/advisories/42716
secunia.com/advisories/42818
support.avaya.com/css/P8/documents/100124650
www.mandriva.com/security/advisories?name=MDVSA-2010:251
www.mozilla.org/security/announce/2010/mfsa2010-80.html
www.redhat.com/support/errata/RHSA-2010-0966.html
www.securityfocus.com/bid/45326
www.securitytracker.com/id?1024848
www.ubuntu.com/usn/USN-1019-1
www.vupen.com/english/advisories/2011/0030
www.zerodayinitiative.com/advisories/ZDI-10-264/
bugzilla.mozilla.org/show_bug.cgi?id=590771
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12649