The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox prior to 18.0, Firefox ESR 17.x prior to 17.0.2, Thunderbird prior to 17.0.2, Thunderbird ESR 17.x prior to 17.0.2, and SeaMonkey prior to 2.15 does not ensure thread safety for SSL sessions, which allows remote malicious users to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox |
||
mozilla firefox esr |
||
mozilla seamonkey |
||
mozilla thunderbird |
||
mozilla thunderbird esr |
||
opensuse opensuse 11.4 |
||
opensuse opensuse 12.1 |
||
opensuse opensuse 12.2 |
||
suse linux enterprise desktop 10 |
||
suse linux enterprise desktop 11 |
||
suse linux enterprise server 10 |
||
suse linux enterprise server 11 |
||
suse linux enterprise software development kit 11 |
||
canonical ubuntu linux 10.04 |
||
canonical ubuntu linux 11.10 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 12.10 |