Mozilla Firefox/Thunderbird/SeaMonkey 'cssText' Memory Corruption Vulnerability
Mozilla Firefox, SeaMonkey, and Thunderbird are prone to a memory-corruption vulnerability that may allow remote code execution.
An attacker could exploit this issue by enticing an unsuspecting user to view malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
This issue is fixed in:
Firefox ESR 10.0.3
Thunderbird ESR 10.0.3