Rapid7 Vulnerability & Exploit Database

MFSA2010-17 SeaMonkey: Remote code execution with use-after-free in nsTreeSelection (CVE-2010-0175)

Back to Search

MFSA2010-17 SeaMonkey: Remote code execution with use-after-free in nsTreeSelection (CVE-2010-0175)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
04/05/2010
Created
07/25/2018
Added
02/03/2012
Modified
02/13/2015

Description

Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.

Solution(s)

  • mozilla-seamonkey-upgrade-2_0_4

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;