Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox prior to 26.0, Firefox ESR 24.x prior to 24.2, Thunderbird prior to 24.2, and SeaMonkey prior to 2.23 allows remote malicious users to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox |
||
mozilla firefox esr |
||
mozilla seamonkey |
||
mozilla thunderbird |
||
fedoraproject fedora 18 |
||
fedoraproject fedora 19 |
||
fedoraproject fedora 20 |
||
suse suse linux enterprise software development kit 11.0 |
||
opensuse opensuse 12.2 |
||
opensuse opensuse 12.3 |
||
opensuse opensuse 13.1 |
||
suse suse linux enterprise desktop 11 |
||
suse suse linux enterprise server 11 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux eus 6.5 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux server aus 6.5 |
||
redhat enterprise linux server eus 6.5 |
||
redhat enterprise linux server tus 6.5 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux workstation 6.0 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 12.10 |
||
canonical ubuntu linux 13.04 |
||
canonical ubuntu linux 13.10 |