First published: Mon Feb 22 2010(Updated: )
Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | =1.1.10 | |
Mozilla SeaMonkey | =1.0.3 | |
Firefox | =3.0.17 | |
Firefox | =3.5.3 | |
Mozilla SeaMonkey | =1.1.8 | |
Firefox | =3.0.7 | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.1.7 | |
Firefox | =3.0.9 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.9 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =1.0 | |
Firefox | =3.5.6 | |
Firefox | =3.0.8 | |
Mozilla SeaMonkey | =2.0.2 | |
Mozilla SeaMonkey | =1.1.17 | |
Mozilla SeaMonkey | =2.0-alpha_2 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.0.7 | |
Firefox | =3.5 | |
Mozilla SeaMonkey | =1.0-beta | |
Firefox | =3.5.5 | |
Firefox | =3.0.4 | |
Mozilla SeaMonkey | =2.0-rc2 | |
Mozilla SeaMonkey | =2.0-alpha_3 | |
Firefox | =3.5.4 | |
Firefox | =3.5.7 | |
Firefox | =3.0.5 | |
Mozilla SeaMonkey | =1.0-alpha | |
Mozilla SeaMonkey | =1.1.12 | |
Firefox | =3.5.1 | |
Mozilla SeaMonkey | =1.1 | |
Firefox | =3.0.14 | |
Firefox | =3.5.2 | |
Mozilla SeaMonkey | =1.1.14 | |
Firefox | =3.0-beta2 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =2.0-beta_2 | |
Firefox | =3.0.10 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.8 | |
Mozilla SeaMonkey | =1.1.11 | |
Firefox | =3.0.12 | |
Firefox | =3.0.3 | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =2.0.1 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.1.15 | |
Firefox | =3.0.6 | |
Firefox | =3.0.15 | |
Mozilla SeaMonkey | =1.1.6 | |
Firefox | =3.0 | |
Mozilla SeaMonkey | =1.1.16 | |
Firefox | =3.0.1 | |
Mozilla SeaMonkey | =2.0-beta_1 | |
Firefox | =3.0.2 | |
Mozilla SeaMonkey | =2.0-rc1 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | =1.1.9 | |
Mozilla SeaMonkey | =1.1.13 | |
Firefox | =3.0-beta5 | |
Firefox | =3.0.13 | |
Mozilla SeaMonkey | =2.0 | |
Firefox | =3.0-alpha | |
Mozilla SeaMonkey | =1.1.4 | |
Firefox | =3.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-1571 is classified as critical due to the potential for remote code execution.
To fix CVE-2009-1571, users should update their Mozilla Firefox, Thunderbird, or SeaMonkey to the latest versions that include the security patches.
CVE-2009-1571 affects Mozilla Firefox versions 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3.
CVE-2009-1571 is categorized as a use-after-free vulnerability in the HTML parser.
Yes, CVE-2009-1571 can be exploited remotely by attackers to execute arbitrary code.