First published: Wed Jun 23 2010(Updated: )
Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =3.5.3 | |
Firefox | =3.5.6 | |
Firefox | =3.5 | |
Firefox | =3.5.5 | |
Firefox | =3.5.9 | |
Firefox | =3.5.4 | |
Firefox | =3.5.7 | |
Firefox | =3.5.1 | |
Firefox | =3.5.2 | |
Mozilla SeaMonkey | =1.1.10 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla SeaMonkey | =1.1.8 | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.1.7 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.9 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =2.0.3 | |
Mozilla SeaMonkey | =2.0.2 | |
Mozilla SeaMonkey | =1.1.17 | |
Mozilla SeaMonkey | =2.0-alpha_2 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.0.7 | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla SeaMonkey | =1.1-alpha | |
Mozilla SeaMonkey | =2.0-rc2 | |
Mozilla SeaMonkey | =2.0-alpha_3 | |
Mozilla SeaMonkey | =1.0-alpha | |
Mozilla SeaMonkey | =1.1.12 | |
Mozilla SeaMonkey | =1.1 | |
Mozilla SeaMonkey | =1.1.14 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =2.0-beta_2 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.8 | |
Mozilla SeaMonkey | =1.1.11 | |
Mozilla SeaMonkey | =2.0-alpha_1 | |
Mozilla SeaMonkey | =1.1-beta | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =2.0.1 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.1.15 | |
Mozilla SeaMonkey | =1.1.6 | |
Mozilla SeaMonkey | =1.1.16 | |
Mozilla SeaMonkey | =2.0-beta_1 | |
Mozilla SeaMonkey | =1.1.19 | |
Mozilla SeaMonkey | =2.0-rc1 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | =1.1.9 | |
Mozilla SeaMonkey | =1.1.13 | |
Mozilla SeaMonkey | =1.1.18 | |
Mozilla SeaMonkey | <=2.0.4 | |
Mozilla SeaMonkey | =2.0 | |
Mozilla SeaMonkey | =1.1.4 | |
Firefox | =3.6.2 | |
Firefox | =3.6.3 | |
Firefox | =3.6 | |
Thunderbird | =1.5.0.7 | |
Thunderbird | =0.6 | |
Thunderbird | =2.0.0.4 | |
Thunderbird | =2.0.0.6 | |
Thunderbird | =0.3 | |
Thunderbird | =3.0.1 | |
Thunderbird | =0.2 | |
Thunderbird | =1.0.7 | |
Thunderbird | =2.0.0.18 | |
Thunderbird | =2.0.0.9 | |
Thunderbird | =2.0.0.16 | |
Thunderbird | =1.5.0.10 | |
Thunderbird | =1.5.0.5 | |
Thunderbird | =1.0 | |
Thunderbird | =3.0.3 | |
Thunderbird | =1.0.2 | |
Thunderbird | =2.0.0.0 | |
Thunderbird | =1.5.0.13 | |
Thunderbird | =2.0.0.12 | |
Thunderbird | =1.5 | |
Thunderbird | =1.5.0.2 | |
Thunderbird | <=3.0.4 | |
Thunderbird | =1.5.0.8 | |
Thunderbird | =2.0.0.14 | |
Thunderbird | =0.5 | |
Thunderbird | =2.0.0.17 | |
Thunderbird | =1.5.0.9 | |
Thunderbird | =0.9 | |
Thunderbird | =3.0 | |
Thunderbird | =1.5.0.12 | |
Thunderbird | =0.4 | |
Thunderbird | =0.7 | |
Thunderbird | =1.5.0.14 | |
Thunderbird | =1.0.6 | |
Thunderbird | =2.0.0.5 | |
Thunderbird | =1.0.8 | |
Thunderbird | =0.1 | |
Thunderbird | =1.0.5 | |
Thunderbird | =0.8 | |
Thunderbird | =3.0.2 | |
Thunderbird | =2.0.0.19 | |
Thunderbird | =1.5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1199 has a severity rating of high due to its potential to allow remote code execution.
To fix CVE-2010-1199, update to Mozilla Firefox 3.5.10 or higher, 3.6.4 or higher, Thunderbird 3.0.5 or higher, or SeaMonkey 2.0.5 or higher.
CVE-2010-1199 affects Mozilla Firefox versions 3.5.x before 3.5.10, 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5.
CVE-2010-1199 is classified as an integer overflow vulnerability within the XSLT node sorting implementation.
Yes, CVE-2010-1199 can be exploited remotely using a specially crafted large text value for a node.