The block reflow implementation in Mozilla Firefox prior to 2.0.0.15, Thunderbird 2.0.0.14 and previous versions, and SeaMonkey prior to 1.1.10 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox 2.0.0.12 |
||
mozilla firefox 2.0.0.13 |
||
mozilla firefox 2.0.0.8 |
||
mozilla firefox 2.0.0.9 |
||
mozilla seamonkey 1.1 |
||
mozilla seamonkey 1.1.8 |
||
mozilla thunderbird 2.0.0.0 |
||
mozilla thunderbird 2.0.0.4 |
||
mozilla thunderbird 2.0.0.5 |
||
mozilla firefox 2.0.0.10 |
||
mozilla firefox 2.0.0.11 |
||
mozilla firefox 2.0.0.6 |
||
mozilla firefox 2.0.0.7 |
||
mozilla seamonkey 1.1.6 |
||
mozilla seamonkey 1.1.7 |
||
mozilla thunderbird 2.0.0.2 |
||
mozilla thunderbird 2.0.0.3 |
||
mozilla seamonkey |
||
mozilla thunderbird |
||
mozilla firefox 2.0 |
||
mozilla firefox 2.0.0.1 |
||
mozilla firefox 2.0.0.4 |
||
mozilla firefox 2.0.0.5 |
||
mozilla seamonkey 1.1.4 |
||
mozilla seamonkey 1.1.5 |
||
mozilla thunderbird 2.0.0.12 |
||
mozilla thunderbird 2.0.0.13 |
||
mozilla thunderbird 2.0.0.9 |
||
mozilla firefox |
||
mozilla firefox 2.0.0.2 |
||
mozilla firefox 2.0.0.3 |
||
mozilla seamonkey 1.1.2 |
||
mozilla seamonkey 1.1.3 |
||
mozilla thunderbird 2.0.0.1 |
||
mozilla thunderbird 2.0.0.11 |
||
mozilla thunderbird 2.0.0.6 |
||
mozilla thunderbird 2.0.0.8 |