Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://www.debian.org/security/2011/dsa-2228 | vendor advisory |
http://securityreason.com/securityalert/8340 | third party advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:079 | vendor advisory |
http://www.mozilla.org/security/announce/2011/mfsa2011-13.html | vendor advisory |
http://securityreason.com/securityalert/8331 | third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=634986 | |
http://www.debian.org/security/2011/dsa-2235 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14142 | vdb entry signature |
http://www.debian.org/security/2011/dsa-2227 | vendor advisory |
http://securityreason.com/securityalert/8326 | third party advisory |
http://downloads.avaya.com/css/P8/documents/100144158 |