MDVSA-2010:051 -- Mandriva mozilla-thunderbird
|ID: oval:org.secpod.oval:def:300214||Date: (C)2012-01-07 (M)2017-10-04|
|Class: PATCH||Family: unix|
A vulnerabilitiy has been found and corrected in mozilla-thunderbird: Security researcher Alin Rad Pop of Secunia Research reported that the HTML parser incorrectly freed used memory when insufficient space was available to process remaining input. Under such circumstances, memory occupied by in-use objects was freed and could later be filled with attacker-controlled text. These conditions could result in the execution or arbitrary code if methods on the freed objects were subsequently called . Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.
|Mandriva Linux 2010.0|
|Mandriva Linux 2009.1|
|Mandriva Linux 2008.0|