Mozilla Firefox and SeaMonkey Plugin Parameters – Remote Buffer Overflow

  • 作者: J23
    日期: 2010-07-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34358/
  • source: https://www.securityfocus.com/bid/41842/info
    
    Mozilla Firefox and SeaMonkey are prone to a buffer-overflow vulnerability.
    
    An attacker can exploit this issue by tricking an unsuspecting victim into viewing a page containing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application.
    
    This issue is fixed in:
    
    Firefox 3.6.7
    Firefox 3.5.11
    SeaMonkey 2.0.6
    
    NOTE: This issue was previously covered in BID 41824 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-34 Through -47 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it. 
    
    https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34358.zip