Mozilla Firefox/Thunderbird/SeaMonkey 'cssText' Memory Corruption Vulnerability

Mozilla Firefox, SeaMonkey, and Thunderbird are prone to a memory-corruption vulnerability that may allow remote code execution.

An attacker could exploit this issue by enticing an unsuspecting user to view malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

This issue is fixed in:

Firefox 11.0
Firefox ESR 10.0.3
Thunderbird 11.0
Thunderbird ESR 10.0.3
SeaMonkey 2.8


 

Privacy Statement
Copyright 2010, SecurityFocus