First published: Mon Apr 05 2010(Updated: )
Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =0.1 | |
Firefox | =0.8 | |
Firefox | =2.0.0.12 | |
Firefox | =1.5-beta2 | |
Firefox | =3.5.3 | |
Firefox | =3.0.7 | |
Firefox | =1.5.2 | |
Firefox | =3.0.9 | |
Firefox | =1.5.0.6 | |
Firefox | =2.0.0.2 | |
Firefox | =1.5.0.10 | |
Firefox | =1.5.0.3 | |
Firefox | =3.5.6 | |
Firefox | =3.0.8 | |
Firefox | =1.5.0.11 | |
Firefox | =1.5.4 | |
Firefox | =1.0.2 | |
Firefox | =3.5 | |
Firefox | =3.5.5 | |
Firefox | =3.0.4 | |
Firefox | =1.5-beta1 | |
Firefox | =3.5.4 | |
Firefox | =3.5.7 | |
Firefox | =3.0.5 | |
Firefox | =1.5 | |
Firefox | =0.9.1 | |
Firefox | =1.0.4 | |
Firefox | =2.0.0.7 | |
Firefox | =1.0.7 | |
Firefox | =3.5.1 | |
Firefox | =2.0.0.9 | |
Firefox | =0.10.1 | |
Firefox | =3.0.14 | |
Firefox | =3.5.2 | |
Firefox | =0.9 | |
Firefox | =2.0.0.16 | |
Firefox | =1.5.6 | |
Firefox | =2.0.0.17 | |
Firefox | =0.7 | |
Firefox | =2.0.0.15 | |
Firefox | =3.0.10 | |
Firefox | =0.2 | |
Firefox | =0.3 | |
Firefox | =3.0.12 | |
Firefox | =1.0 | |
Firefox | =3.0.3 | |
Firefox | =1.5.0.7 | |
Firefox | =2.0 | |
Firefox | =1.0.1 | |
Firefox | =2.0.0.14 | |
Firefox | =0.6 | |
Firefox | =0.7.1 | |
Firefox | =3.0.6 | |
Firefox | =3.0.15 | |
Firefox | =1.5.0.8 | |
Firefox | =2.0.0.3 | |
Firefox | =1.5.0.9 | |
Firefox | =1.5.0.5 | |
Firefox | =1.5.7 | |
Firefox | =1.5.0.12 | |
Firefox | =2.0.0.6 | |
Firefox | =3.0 | |
Firefox | =2.0.0.11 | |
Firefox | =1.5.0.2 | |
Firefox | =1.0.3 | |
Firefox | =3.0.1 | |
Firefox | =2.0.0.4 | |
Firefox | =0.5 | |
Firefox | =0.6.1 | |
Firefox | =1.5.1 | |
Firefox | <=3.0.17 | |
Firefox | =0.9.3 | |
Firefox | =2.0.0.13 | |
Firefox | =2.0.0.18 | |
Firefox | =2.0.0.1 | |
Firefox | =3.0.2 | |
Firefox | =1.5.5 | |
Firefox | =0.9.2 | |
Firefox | =1.0-preview_release | |
Firefox | =2.0.0.20 | |
Firefox | =2.0.0.8 | |
Firefox | =0.9-rc | |
Firefox | =2.0.0.19 | |
Firefox | =1.5.8 | |
Firefox | =1.5.3 | |
Firefox | =0.4 | |
Firefox | =1.5.0.4 | |
Firefox | =1.5.0.1 | |
Firefox | =3.0.13 | |
Firefox | =0.10 | |
Firefox | =1.0.5 | |
Firefox | =2.0.0.5 | |
Firefox | =2.0.0.10 | |
Firefox | =1.0.6 | |
Firefox | =3.0.16 | |
Firefox | =1.0.8 | |
Firefox | =3.0.11 | |
Thunderbird | =1.5.0.7 | |
Thunderbird | =0.6 | |
Thunderbird | =0.7.2 | |
Thunderbird | =2.0.0.4 | |
Thunderbird | =2.0.0.6 | |
Thunderbird | =0.3 | |
Thunderbird | =2.0.0.21 | |
Thunderbird | =3.0.1 | |
Thunderbird | =0.2 | |
Thunderbird | =1.0.7 | |
Thunderbird | =2.0.0.18 | |
Thunderbird | =2.0.0.9 | |
Thunderbird | =2.0.0.16 | |
Thunderbird | =2.0.0.8 | |
Thunderbird | =2.0.0.7 | |
Thunderbird | =1.5.0.3 | |
Thunderbird | =1.5.0.10 | |
Thunderbird | =1.5.0.5 | |
Thunderbird | =1.5.0.6 | |
Thunderbird | =1.0 | |
Thunderbird | =2.0.0.3 | |
Thunderbird | =1.0.1 | |
Thunderbird | =1.5-beta2 | |
Thunderbird | =2.0.0.2 | |
Thunderbird | =1.0.2 | |
Thunderbird | =2.0.0.0 | |
Thunderbird | =1.5.0.13 | |
Thunderbird | =2.0.0.12 | |
Thunderbird | =2.0.0.22 | |
Thunderbird | =1.5 | |
Thunderbird | =1.5.0.2 | |
Thunderbird | =1.5.0.8 | |
Thunderbird | =2.0.0.14 | |
Thunderbird | =0.5 | |
Thunderbird | =1.0.4 | |
Thunderbird | =1.5.2 | |
Thunderbird | =2.0.0.17 | |
Thunderbird | =2.0.0.23 | |
Thunderbird | =1.5.0.9 | |
Thunderbird | =1.5.0.11 | |
Thunderbird | =0.9 | |
Thunderbird | =1.0.3 | |
Thunderbird | =2.0 | |
Thunderbird | =1.5.0.12 | |
Thunderbird | =0.7.3 | |
Thunderbird | =0.4 | |
Thunderbird | =1.5.1 | |
Thunderbird | =0.7 | |
Thunderbird | =1.5.0.14 | |
Thunderbird | =1.0.6 | |
Thunderbird | =2.0.0.5 | |
Thunderbird | =2.0.0.1 | |
Thunderbird | =1.5.0.1 | |
Thunderbird | <=3.0.3 | |
Thunderbird | =1.0.8 | |
Thunderbird | =0.1 | |
Thunderbird | =0.7.1 | |
Thunderbird | =1.0.5 | |
Thunderbird | =0.8 | |
Thunderbird | =3.0.2 | |
Thunderbird | =2.0.0.19 | |
Thunderbird | =1.5.0.4 | |
Mozilla SeaMonkey | =1.1.10 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla SeaMonkey | =1.1.8 | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.1.7 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.9 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =2.0.4 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =2.0.2 | |
Mozilla SeaMonkey | =1.1.17 | |
Mozilla SeaMonkey | =2.0-alpha_2 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.0.7 | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla SeaMonkey | =1.1-alpha | |
Mozilla SeaMonkey | =2.0-rc2 | |
Mozilla SeaMonkey | =2.0-alpha_3 | |
Mozilla SeaMonkey | =1.0-alpha | |
Mozilla SeaMonkey | =1.1.12 | |
Mozilla SeaMonkey | =1.1 | |
Mozilla SeaMonkey | =1.1.14 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =2.0-beta_2 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.8 | |
Mozilla SeaMonkey | =1.1.11 | |
Mozilla SeaMonkey | =2.0-alpha_1 | |
Mozilla SeaMonkey | =1.1-beta | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =2.0.1 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.1.15 | |
Mozilla SeaMonkey | =1.1.6 | |
Mozilla SeaMonkey | =1.1.16 | |
Mozilla SeaMonkey | =2.0-beta_1 | |
Mozilla SeaMonkey | =1.1.19 | |
Mozilla SeaMonkey | =2.0-rc1 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | =1.1.9 | |
Mozilla SeaMonkey | =1.1.13 | |
Mozilla SeaMonkey | =1.1.18 | |
Mozilla SeaMonkey | =2.0 | |
Mozilla SeaMonkey | <=2.0.3 | |
Mozilla SeaMonkey | =1.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0175 is classified as a critical vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service.
To fix CVE-2010-0175, upgrade to the latest version of Mozilla Firefox, Thunderbird, or SeaMonkey that addresses this vulnerability.
CVE-2010-0175 affects Mozilla Firefox versions before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4.
CVE-2010-0175 is a use-after-free vulnerability in the nsTreeSelection implementation.
Yes, CVE-2010-0175 can be exploited remotely through unspecified vectors, potentially leading to arbitrary code execution.