Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird prior to 6, SeaMonkey 2.x prior to 2.3, and possibly other products allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla seamonkey 2.0 |
||
mozilla seamonkey 2.0.1 |
||
mozilla seamonkey 2.0.10 |
||
mozilla seamonkey 2.0.4 |
||
mozilla seamonkey 2.0.5 |
||
mozilla seamonkey 2.1 |
||
mozilla seamonkey 2.2 |
||
mozilla firefox 4.0 |
||
mozilla firefox 4.0.1 |
||
mozilla firefox 5.0 |
||
mozilla seamonkey 2.0.11 |
||
mozilla seamonkey 2.0.12 |
||
mozilla seamonkey 2.0.6 |
||
mozilla seamonkey 2.0.7 |
||
mozilla thunderbird |
||
mozilla seamonkey 2.0.2 |
||
mozilla seamonkey 2.0.3 |
||
mozilla seamonkey 2.0.13 |
||
mozilla seamonkey 2.0.14 |
||
mozilla seamonkey 2.0.8 |
||
mozilla seamonkey 2.0.9 |