Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-4212 Use After Free Memory Corruption Vulnerability

Mozilla Firefox, SeaMonkey, and Thunderbird are prone to a heap-based memory-corruption vulnerability.

A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

Note: This issue was previously discussed in BID 56607 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2012-91 through -106 Multiple Vulnerabilities), but has been moved to its own record to better document it.

This issue was fixed in:

Firefox 17.0
Thunderbird 17.0
SeaMonkey 2.14


 

Privacy Statement
Copyright 2010, SecurityFocus