First published: Sat Feb 11 2012(Updated: )
Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =10.0 | |
Thunderbird | =10.0 | |
Mozilla SeaMonkey | =2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0452 has been classified as a high-severity vulnerability due to its potential to cause application crashes and possible arbitrary code execution.
To fix CVE-2012-0452, upgrade to Mozilla Firefox version 10.0.1, Thunderbird version 10.0.1, or SeaMonkey version 2.7 or later.
CVE-2012-0452 affects Mozilla Firefox 10.0, Mozilla Thunderbird 10.0, and Mozilla SeaMonkey 2.7.
CVE-2012-0452 is identified as a use-after-free vulnerability.
Yes, CVE-2012-0452 can be exploited remotely through crafted content that triggers the vulnerability.