Rapid7 Vulnerability & Exploit Database

MFSA2012-41 SeaMonkey: Use-after-free in nsHTMLSelectElement (CVE-2011-3671)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

MFSA2012-41 SeaMonkey: Use-after-free in nsHTMLSelectElement (CVE-2011-3671)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
06/18/2012
Created
07/25/2018
Added
06/19/2012
Modified
04/05/2017

Description

Use-after-free vulnerability in the nsHTMLSelectElement function in nsHTMLSelectElement.cpp in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allows remote attackers to execute arbitrary code via vectors involving removal of the parent node of an element.

Solution(s)

  • mozilla-seamonkey-upgrade-2_6_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;