Mozilla Firefox/Thunderbird/SeaMonkey – Multiple Memory Corruption Vulnerabilities

  • 作者: Bob Clary
    日期: 2010-03-24
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/33801/
  • source: https://www.securityfocus.com/bid/38944/info
    
    Mozilla Firefox, Thunderbird and Seamonkey are prone to multiple remote memory-corruption vulnerabilities.
    
    Successful exploits may allow an attacker to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition.
    
    NOTE: These issues were previously covered in BID 38918 (Mozilla Firefox Thunderbird and Seamonkey MFSA 2010-09 through -15 Multiple Vulnerabilities) but have been assigned their own record to better document them.
    
    <html> <head></head> <body style="font-family: monospace; width: 0;"> <div style="-moz-column-count: 4;"><div>a b c d<span style="display: list-item;"></span></div></div> </body> </html>