First published: Fri Apr 14 2006(Updated: )
The JavaScript engine in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly handle temporary variables that are not garbage collected, which might allow remote attackers to trigger operations on freed memory and cause memory corruption.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =1.5-beta2 | |
Mozilla Mozilla Suite | <=1.7.12 | |
Mozilla Firefox | =1.0.2 | |
Mozilla Firefox | =1.5-beta1 | |
Mozilla Firefox | =1.5 | |
Mozilla Mozilla Suite | =1.7.10 | |
Mozilla Firefox | =1.0.4 | |
Mozilla Mozilla Suite | =1.7.8 | |
Mozilla Thunderbird | =1.0 | |
Mozilla Thunderbird | =1.0.1 | |
Mozilla Thunderbird | =1.5-beta2 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla Thunderbird | =1.0.2 | |
Mozilla Mozilla Suite | =1.7.11 | |
Mozilla Firefox | =1.0 | |
Mozilla Thunderbird | =1.5 | |
Mozilla Firefox | =1.0.1 | |
Mozilla Thunderbird | =1.0.4 | |
Mozilla Thunderbird | =1.0.3 | |
Mozilla Firefox | =1.0.3 | |
Mozilla Thunderbird | =1.0.6 | |
Mozilla Thunderbird | =1.0.5-beta | |
Mozilla Mozilla Suite | =1.7.7 | |
Mozilla Firefox | <=1.0.7 | |
Mozilla Mozilla Suite | =1.7.6 | |
Mozilla SeaMonkey | <=1.0 | |
Mozilla Thunderbird | <=1.0.7 | |
Mozilla Thunderbird | =1.0.5 | |
Mozilla Firefox | =1.0.5 | |
Mozilla Firefox | =1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.