9.3
CVSSv2

CVE-2010-1198

Published: 24/06/2010 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, and SeaMonkey prior to 2.0.5, allows remote malicious users to execute arbitrary code via vectors involving multiple plugin instances.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 3.5

mozilla firefox 3.5.1

mozilla firefox 3.5.7

mozilla firefox 3.5.9

mozilla firefox 3.5.2

mozilla firefox 3.5.3

mozilla firefox 3.5.4

mozilla firefox 3.5.5

mozilla firefox 3.5.6

mozilla seamonkey 2.0.1

mozilla seamonkey 2.0

mozilla seamonkey 1.1.19

mozilla seamonkey 1.1.18

mozilla seamonkey 1.1.11

mozilla seamonkey 1.1.10

mozilla seamonkey 1.1.3

mozilla seamonkey 1.1.2

mozilla seamonkey 1.1.1

mozilla seamonkey 1.0.6

mozilla seamonkey 1.0.5

mozilla seamonkey 1.0

mozilla seamonkey 1.1.17

mozilla seamonkey 1.1.16

mozilla seamonkey 1.1.9

mozilla seamonkey 1.1.8

mozilla seamonkey 1.1

mozilla seamonkey 1.0.4

mozilla seamonkey 1.0.3

mozilla seamonkey 2.0.3

mozilla seamonkey 2.0.2

mozilla seamonkey 1.1.13

mozilla seamonkey 1.1.12

mozilla seamonkey 1.1.5

mozilla seamonkey 1.1.4

mozilla seamonkey 1.0.8

mozilla seamonkey 1.0.7

mozilla seamonkey

mozilla seamonkey 1.1.15

mozilla seamonkey 1.1.14

mozilla seamonkey 1.1.7

mozilla seamonkey 1.1.6

mozilla seamonkey 1.0.9

mozilla seamonkey 1.0.2

mozilla seamonkey 1.0.1

mozilla firefox 3.6

mozilla firefox 3.6.2

mozilla firefox 3.6.3

Vendor Advisories

Synopsis Moderate: thunderbird security update Type/Severity Security Advisory: Moderate Topic An updated thunderbird package that fixes several security issues is nowavailable for Red Hat Enterprise Linux 4The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common V ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-0183 "wushi" discovered that incorrect pointer handling in the frame processing code could lead to the execution of arbitrary code CVE-20 ...
Firefox could be made to run programs as your login if it opened a specially crafted file or website ...
This update fixes a problem with Firefox not installing alongside the old Firefox 2 package ...
Firefox could be made to run programs as your login if it opened a specially crafted file or website ...
Firefox could be made to run programs as your login if it opened a specially crafted file or website ...
Mozilla Foundation Security Advisory 2010-28 Freed object reuse across plugin instances Announced June 22, 2010 Reporter Microsoft Vulnerability Research Impact Critical Products Firefox, SeaMonkey Fixed in ...

References

CWE-399http://www.securityfocus.com/bid/41050https://bugzilla.mozilla.org/show_bug.cgi?id=532246http://www.mozilla.org/security/announce/2010/mfsa2010-28.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:125http://www.vupen.com/english/advisories/2010/1556http://www.redhat.com/support/errata/RHSA-2010-0500.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0501.htmlhttp://www.securitytracker.com/id?1024138http://www.redhat.com/support/errata/RHSA-2010-0499.htmlhttp://www.securityfocus.com/bid/41102http://www.vupen.com/english/advisories/2010/1557http://www.vupen.com/english/advisories/2010/1551http://secunia.com/advisories/40326http://support.avaya.com/css/P8/documents/100091069http://secunia.com/advisories/40401http://www.vupen.com/english/advisories/2010/1640http://ubuntu.com/usn/usn-930-1http://www.ubuntu.com/usn/usn-930-2http://secunia.com/advisories/40481http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.htmlhttp://www.vupen.com/english/advisories/2010/1773http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.htmlhttp://www.vupen.com/english/advisories/2010/1592https://exchange.xforce.ibmcloud.com/vulnerabilities/59664https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14176https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10990https://access.redhat.com/errata/RHSA-2010:0544https://nvd.nist.govhttps://usn.ubuntu.com/930-1/https://www.debian.org/security/./dsa-2064