Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.
lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html
lists.opensuse.org/opensuse-security-announce/2011-08/msg00027.html
www.debian.org/security/2011/dsa-2295
www.debian.org/security/2011/dsa-2296
www.debian.org/security/2011/dsa-2297
www.mandriva.com/security/advisories?name=MDVSA-2011:127
www.mozilla.org/security/announce/2011/mfsa2011-30.html
www.redhat.com/support/errata/RHSA-2011-1164.html
www.redhat.com/support/errata/RHSA-2011-1165.html
www.redhat.com/support/errata/RHSA-2011-1167.html
www.securitytracker.com/id?1025940
bugzilla.mozilla.org/show_bug.cgi?id=626297
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14272