First published: Fri Jul 30 2010(Updated: )
Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =3.5.1 | |
Mozilla Firefox | =3.5.2 | |
Mozilla Firefox | =3.5.3 | |
Mozilla Firefox | =3.5.4 | |
Mozilla Firefox | =3.5.5 | |
Mozilla Firefox | =3.5.6 | |
Mozilla Firefox | =3.5.7 | |
Mozilla Firefox | =3.5.9 | |
Mozilla Firefox | =3.5.10 | |
Mozilla Firefox | =3.6.1 | |
Mozilla Firefox | =3.6.2 | |
Mozilla Firefox | =3.6.3 | |
Mozilla Firefox | =3.6.4 | |
Mozilla Firefox | =3.6.6 | |
Mozilla SeaMonkey | <=2.0.5 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0-alpha | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.7 | |
Mozilla SeaMonkey | =1.0.8 | |
Mozilla SeaMonkey | =1.0.9 | |
Mozilla SeaMonkey | =1.1 | |
Mozilla SeaMonkey | =1.1-alpha | |
Mozilla SeaMonkey | =1.1-beta | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =1.1.4 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.1.6 | |
Mozilla SeaMonkey | =1.1.7 | |
Mozilla SeaMonkey | =1.1.8 | |
Mozilla SeaMonkey | =1.1.9 | |
Mozilla SeaMonkey | =1.1.10 | |
Mozilla SeaMonkey | =1.1.11 | |
Mozilla SeaMonkey | =1.1.12 | |
Mozilla SeaMonkey | =1.1.13 | |
Mozilla SeaMonkey | =1.1.14 | |
Mozilla SeaMonkey | =1.1.15 | |
Mozilla SeaMonkey | =1.1.16 | |
Mozilla SeaMonkey | =1.1.17 | |
Mozilla SeaMonkey | =1.1.18 | |
Mozilla SeaMonkey | =1.1.19 | |
Mozilla SeaMonkey | =1.5.0.8 | |
Mozilla SeaMonkey | =1.5.0.9 | |
Mozilla SeaMonkey | =1.5.0.10 | |
Mozilla SeaMonkey | =2.0 | |
Mozilla SeaMonkey | =2.0-alpha_1 | |
Mozilla SeaMonkey | =2.0-alpha_2 | |
Mozilla SeaMonkey | =2.0-alpha_3 | |
Mozilla SeaMonkey | =2.0-beta_1 | |
Mozilla SeaMonkey | =2.0-beta_2 | |
Mozilla SeaMonkey | =2.0-rc1 | |
Mozilla SeaMonkey | =2.0-rc2 | |
Mozilla SeaMonkey | =2.0.1 | |
Mozilla SeaMonkey | =2.0.2 | |
Mozilla SeaMonkey | =2.0.3 | |
Mozilla SeaMonkey | =2.0.4 | |
Mozilla SeaMonkey | =2.0a1pre | |
Mozilla Firefox | >=3.5<3.5.11 | |
Mozilla Firefox | >=3.6<3.6.7 | |
Mozilla SeaMonkey | <2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1208 is classified as high severity due to its potential for remote code execution.
To fix CVE-2010-1208, update Mozilla Firefox to version 3.5.11 or later or 3.6.7 or later, or update SeaMonkey to version 2.0.6 or later.
CVE-2010-1208 affects Mozilla Firefox versions 3.5.x below 3.5.11 and 3.6.x below 3.6.7, as well as SeaMonkey versions below 2.0.6.
Yes, attackers can exploit CVE-2010-1208 through a use-after-free vulnerability, allowing them to execute arbitrary code.
Users of affected software should immediately update to the latest patched versions to mitigate the risks associated with CVE-2010-1208.