Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2010-3765

Back to Search

SUSE Linux Security Vulnerability: CVE-2010-3765

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
10/27/2010
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.

Solution(s)

  • suse-upgrade-enigmail
  • suse-upgrade-gconf2
  • suse-upgrade-gconf2-32bit
  • suse-upgrade-gconf2-x86
  • suse-upgrade-libfreebl3
  • suse-upgrade-libfreebl3-32bit
  • suse-upgrade-libfreebl3-x86
  • suse-upgrade-libidl
  • suse-upgrade-libidl-32bit
  • suse-upgrade-libidl-x86
  • suse-upgrade-mozilla-js192
  • suse-upgrade-mozilla-js192-32bit
  • suse-upgrade-mozilla-nspr
  • suse-upgrade-mozilla-nspr-32bit
  • suse-upgrade-mozilla-nspr-x86
  • suse-upgrade-mozilla-nss
  • suse-upgrade-mozilla-nss-32bit
  • suse-upgrade-mozilla-nss-tools
  • suse-upgrade-mozilla-nss-x86
  • suse-upgrade-mozilla-xulrunner190
  • suse-upgrade-mozilla-xulrunner190-32bit
  • suse-upgrade-mozilla-xulrunner190-gnomevfs
  • suse-upgrade-mozilla-xulrunner190-translations
  • suse-upgrade-mozilla-xulrunner190-x86
  • suse-upgrade-mozilla-xulrunner191
  • suse-upgrade-mozilla-xulrunner191-32bit
  • suse-upgrade-mozilla-xulrunner191-devel
  • suse-upgrade-mozilla-xulrunner191-gnomevfs
  • suse-upgrade-mozilla-xulrunner191-gnomevfs-32bit
  • suse-upgrade-mozilla-xulrunner191-translations
  • suse-upgrade-mozilla-xulrunner191-translations-common
  • suse-upgrade-mozilla-xulrunner191-translations-other
  • suse-upgrade-mozilla-xulrunner191-x86
  • suse-upgrade-mozilla-xulrunner192
  • suse-upgrade-mozilla-xulrunner192-32bit
  • suse-upgrade-mozilla-xulrunner192-buildsymbols
  • suse-upgrade-mozilla-xulrunner192-devel
  • suse-upgrade-mozilla-xulrunner192-gnome
  • suse-upgrade-mozilla-xulrunner192-gnome-32bit
  • suse-upgrade-mozilla-xulrunner192-translations
  • suse-upgrade-mozilla-xulrunner192-translations-common
  • suse-upgrade-mozilla-xulrunner192-translations-common-32bit
  • suse-upgrade-mozilla-xulrunner192-translations-other
  • suse-upgrade-mozilla-xulrunner192-translations-other-32bit
  • suse-upgrade-mozilla-xulrunner192-x86
  • suse-upgrade-mozillafirefox
  • suse-upgrade-mozillafirefox-branding-sled
  • suse-upgrade-mozillafirefox-branding-upstream
  • suse-upgrade-mozillafirefox-translations
  • suse-upgrade-mozillafirefox-translations-common
  • suse-upgrade-mozillafirefox-translations-other
  • suse-upgrade-mozillathunderbird
  • suse-upgrade-mozillathunderbird-devel
  • suse-upgrade-mozillathunderbird-translations-common
  • suse-upgrade-mozillathunderbird-translations-other
  • suse-upgrade-orbit2
  • suse-upgrade-orbit2-32bit
  • suse-upgrade-orbit2-x86
  • suse-upgrade-python-xpcom191
  • suse-upgrade-seamonkey
  • suse-upgrade-seamonkey-dom-inspector
  • suse-upgrade-seamonkey-irc
  • suse-upgrade-seamonkey-translations-common
  • suse-upgrade-seamonkey-translations-other
  • suse-upgrade-seamonkey-venkman

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;