CVE-2010-3765
Publication date 27 October 2010
Last updated 24 July 2024
Ubuntu priority
Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Status
Package | Ubuntu Release | Status |
---|---|---|
firefox | ||
firefox-3.0 | ||
firefox-3.5 | ||
seamonkey | ||
thunderbird | ||
xulrunner-1.9.2 | ||
Notes
jdstrand
0-day exploit in wild for Windows. Presumed that other platforms will follow soon. It is unclear if compiler and kernel protections will protect against this, and upstream considers this extremely serious.
References
Related Ubuntu Security Notices (USN)
- USN-1011-1
- Firefox vulnerability
- 28 October 2010
- USN-1011-3
- Xulrunner vulnerability
- 29 October 2010
- USN-1011-2
- Thunderbird vulnerability
- 28 October 2010