Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a dangling pointer vulnerability.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | 3.6 (including) | 3.6 (including) |
Red Hat Enterprise Linux 3 | RedHat | seamonkey-0:1.0.9-0.52.el3 | * |
Red Hat Enterprise Linux 4 | RedHat | firefox-0:3.0.19-1.el4 | * |
Red Hat Enterprise Linux 4 | RedHat | seamonkey-0:1.0.9-54.el4_8 | * |
Red Hat Enterprise Linux 4 | RedHat | thunderbird-0:1.5.0.12-28.el4 | * |
Red Hat Enterprise Linux 5 | RedHat | firefox-0:3.0.19-1.el5_5 | * |
Red Hat Enterprise Linux 5 | RedHat | xulrunner-0:1.9.0.19-1.el5_5 | * |
Red Hat Enterprise Linux 5 | RedHat | thunderbird-0:2.0.0.24-6.el5 | * |
Firefox | Ubuntu | dapper | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | lucid | * |
Firefox | Ubuntu | upstream | * |
Seamonkey | Ubuntu | hardy | * |
Seamonkey | Ubuntu | intrepid | * |
Seamonkey | Ubuntu | jaunty | * |
Seamonkey | Ubuntu | karmic | * |
Seamonkey | Ubuntu | lucid | * |
Seamonkey | Ubuntu | upstream | * |
Thunderbird | Ubuntu | devel | * |
Thunderbird | Ubuntu | hardy | * |
Thunderbird | Ubuntu | intrepid | * |
Thunderbird | Ubuntu | jaunty | * |
Thunderbird | Ubuntu | karmic | * |
Thunderbird | Ubuntu | lucid | * |
Thunderbird | Ubuntu | upstream | * |
Xulrunner-1.9 | Ubuntu | hardy | * |
Xulrunner-1.9 | Ubuntu | intrepid | * |
Xulrunner-1.9 | Ubuntu | jaunty | * |
Xulrunner-1.9 | Ubuntu | upstream | * |
Xulrunner-1.9.1 | Ubuntu | jaunty | * |
Xulrunner-1.9.1 | Ubuntu | karmic | * |
Xulrunner-1.9.1 | Ubuntu | upstream | * |