Use-after-free vulnerability in Mozilla Firefox, Thunderbird and SeaMonkey via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call (Mac OS)ID: oval:org.secpod.oval:def:4165 | Date: (C)2012-02-23 (M)2023-11-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with Mozilla Firefox 10.x before 10.0.1 or Thunderbird before 10.0.1 or SeaMonkey before 2.7.1 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle nsXBLDocumentInfo::ReadPrototypeBindings function call. Successful exploitation allows remote attackers to cause arbitrary code to be executed on the target user's system.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Product: |
Mozilla Firefox |
Mozilla SeaMonkey |
Mozilla Thunderbird |