9.3
CVSSv2

CVE-2010-1196

Published: 24/06/2010 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, Thunderbird prior to 3.0.5, and SeaMonkey prior to 2.0.5 allows remote malicious users to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 3.5.7

mozilla firefox 3.5.9

mozilla firefox 3.5.4

mozilla firefox 3.5.5

mozilla firefox 3.5.6

mozilla firefox 3.5

mozilla firefox 3.5.1

mozilla firefox 3.5.2

mozilla firefox 3.5.3

mozilla seamonkey 2.0

mozilla seamonkey 1.1.18

mozilla seamonkey 1.1.17

mozilla seamonkey 1.1.9

mozilla seamonkey 1.1.8

mozilla seamonkey 1.1.1

mozilla seamonkey 1.1

mozilla seamonkey 1.0.5

mozilla seamonkey 1.0.4

mozilla seamonkey 2.0.1

mozilla seamonkey 1.1.19

mozilla seamonkey 1.1.11

mozilla seamonkey 1.1.10

mozilla seamonkey 1.1.3

mozilla seamonkey 1.1.2

mozilla seamonkey 1.0.7

mozilla seamonkey 1.0.6

mozilla seamonkey 1.0

mozilla seamonkey

mozilla seamonkey 1.1.16

mozilla seamonkey 1.1.15

mozilla seamonkey 1.1.7

mozilla seamonkey 1.1.6

mozilla seamonkey 1.0.3

mozilla seamonkey 1.0.2

mozilla seamonkey 1.0.1

mozilla seamonkey 2.0.3

mozilla seamonkey 2.0.2

mozilla seamonkey 1.1.14

mozilla seamonkey 1.1.13

mozilla seamonkey 1.1.12

mozilla seamonkey 1.1.5

mozilla seamonkey 1.1.4

mozilla seamonkey 1.0.9

mozilla seamonkey 1.0.8

mozilla firefox 3.6.2

mozilla firefox 3.6.3

mozilla firefox 3.6

mozilla thunderbird 3.0

mozilla thunderbird 2.0.0.19

mozilla thunderbird 2.0.0.6

mozilla thunderbird 2.0.0.5

mozilla thunderbird 2.0.0.4

mozilla thunderbird 1.5.0.8

mozilla thunderbird 1.5.0.7

mozilla thunderbird 1.0.6

mozilla thunderbird 1.0.5

mozilla thunderbird 0.4

mozilla thunderbird 0.3

mozilla thunderbird 3.0.2

mozilla thunderbird 3.0.1

mozilla thunderbird 2.0.0.12

mozilla thunderbird 2.0.0.9

mozilla thunderbird 1.5.0.10

mozilla thunderbird 1.5.0.9

mozilla thunderbird 1.0.8

mozilla thunderbird 1.0.7

mozilla thunderbird 0.7

mozilla thunderbird 0.6

mozilla thunderbird 0.5

mozilla thunderbird 2.0.0.18

mozilla thunderbird 2.0.0.17

mozilla thunderbird 2.0.0.0

mozilla thunderbird 1.5.0.14

mozilla thunderbird 1.5.0.5

mozilla thunderbird 1.5.0.4

mozilla thunderbird 1.0.2

mozilla thunderbird 1.0

mozilla thunderbird 0.2

mozilla thunderbird 0.1

mozilla thunderbird

mozilla thunderbird 3.0.3

mozilla thunderbird 2.0.0.16

mozilla thunderbird 2.0.0.14

mozilla thunderbird 1.5.0.13

mozilla thunderbird 1.5.0.12

mozilla thunderbird 1.5.0.2

mozilla thunderbird 1.5

mozilla thunderbird 0.9

mozilla thunderbird 0.8

Vendor Advisories

Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-0183 "wushi" discovered that incorrect pointer handling in the frame processing code could lead to the execution of arbitrary code CVE-20 ...
Firefox could be made to run programs as your login if it opened a specially crafted file or website ...
This update fixes a problem with Firefox not installing alongside the old Firefox 2 package ...
Firefox could be made to run programs as your login if it opened a specially crafted file or website ...
Martin Barbella discovered an integer overflow in an XSLT node sorting routine An attacker could exploit this to overflow a buffer and cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2010-1199) ...
Firefox could be made to run programs as your login if it opened a specially crafted file or website ...
Mozilla Foundation Security Advisory 2010-29 Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal Announced June 22, 2010 Reporter Nils (MWR InfoSecurity) Impact Critical Products Firefox, SeaMonkey, Thunderbird ...

References

CWE-189http://www.mozilla.org/security/announce/2010/mfsa2010-29.htmlhttp://www.securityfocus.com/bid/41050https://bugzilla.mozilla.org/show_bug.cgi?id=534666http://www.mandriva.com/security/advisories?name=MDVSA-2010:125http://www.securityfocus.com/bid/41087http://www.securitytracker.com/id?1024138http://secunia.com/advisories/40326http://www.redhat.com/support/errata/RHSA-2010-0501.htmlhttp://www.securitytracker.com/id?1024139http://www.vupen.com/english/advisories/2010/1557http://secunia.com/advisories/40323http://www.redhat.com/support/errata/RHSA-2010-0500.htmlhttp://www.vupen.com/english/advisories/2010/1551http://support.avaya.com/css/P8/documents/100091069http://www.ubuntu.com/usn/usn-930-2http://www.vupen.com/english/advisories/2010/1640http://ubuntu.com/usn/usn-930-1http://secunia.com/advisories/40401http://secunia.com/advisories/40481http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.htmlhttp://www.vupen.com/english/advisories/2010/1773http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.htmlhttp://www.vupen.com/english/advisories/2010/1592https://exchange.xforce.ibmcloud.com/vulnerabilities/59665https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14017https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11424https://nvd.nist.govhttps://www.debian.org/security/./dsa-2064https://usn.ubuntu.com/930-1/