Rapid7 Vulnerability & Exploit Database

MFSA2010-73 SeaMonkey: Heap buffer overflow mixing document.write and DOM insertion (CVE-2010-3765)

Back to Search

MFSA2010-73 SeaMonkey: Heap buffer overflow mixing document.write and DOM insertion (CVE-2010-3765)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
10/27/2010
Created
07/25/2018
Added
02/03/2012
Modified
02/13/2015

Description

Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.

Solution(s)

  • mozilla-seamonkey-upgrade-2_0_10

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;