Use-after-free vulnerability in the nsXULCommandDispatcher function in
Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey
through 2.0.14 allows remote attackers to execute arbitrary code via a
crafted XUL document that dequeues the current command updater.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | firefox | < 3.6.18+build2+nobinonly-0ubuntu0.10.04.1 | UNKNOWN |
ubuntu | 10.10 | noarch | firefox | < 3.6.18+build2+nobinonly-0ubuntu0.10.10.1 | UNKNOWN |
ubuntu | 10.04 | noarch | thunderbird | < 3.1.11+build2+nobinonly-0ubuntu0.10.04.1 | UNKNOWN |
ubuntu | 10.10 | noarch | thunderbird | < 3.1.11+build2+nobinonly-0ubuntu0.10.10.1 | UNKNOWN |
ubuntu | 11.04 | noarch | thunderbird | < 3.1.11+build2+nobinonly-0ubuntu0.11.04.1 | UNKNOWN |
ubuntu | 10.04 | noarch | xulrunner-1.9.2 | < 1.9.2.18+build2+nobinonly-0ubuntu0.10.04.1 | UNKNOWN |
ubuntu | 10.10 | noarch | xulrunner-1.9.2 | < 1.9.2.18+build2+nobinonly-0ubuntu0.10.10.1 | UNKNOWN |