HTTP: Mozilla Products nsCSSValue Array Index Integer Overflow

This signature detects attempts to exploit a known vulnerability in Mozilla Products. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Mozilla Firefox, Thunderbird, and SeaMonkey are prone to an integer-overflow vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a page containing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. This issue is fixed in: Firefox 3.6.7 Firefox 3.5.11 SeaMonkey 2.0.6 Thunderbird 3.0.6 Thunderbird 3.1.1 NOTE: This issue was previously covered in BID 41824 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-34 Through -47 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

Affected Products

Pardus linux_2009

References

BugTraq: 41852

CVE: CVE-2010-2752

Short Name
HTTP:STC:MOZILLA:NSCSSVALUE-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Array CVE-2010-2752 Index Integer Mozilla Overflow Products bid:41852 nsCSSValue
Release Date
08/04/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Red_hat

Suse

Sun

Mozilla

Avaya

Pardus

Slackware

Ubuntu

CVSS Score

9.3

Found a potential security threat?