Mozilla Products Multiple Vulnerabilities-02 January13 (Mac OS X)

Summary
This host is installed with Mozilla Firefox/Thunderbird/Seamonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation could allow attackers to cause a denial of service or execute arbitrary code in the context of the browser. Impact Level: System/Application
Solution
Upgrade to Mozilla Firefox version 18.0 or ESR version 10.0.12 or 17.0.1 or later, For updates refer to http://www.mozilla.com/en-US/firefox/all.html Upgrade to SeaMonkey version to 2.15 or later, http://www.mozilla.org/projects/seamonkey/ Upgrade to Thunderbird version to 17.0.2 or ESR 10.0.12 or 17.0.1 or later, http://www.mozilla.org/en-US/thunderbird/
Insight
- Use-after-free errors exists within the functions 'nsSVGPathElement::GetPathLengthScale' and 'imgRequest::OnStopFrame' and in the '~nsHTMLEditRules' implementation. - Unspecified error in the browser engine can be exploited to corrupt memory.
Affected
SeaMonkey version before 2.15 on Mac OS X Thunderbird version before 17.0.2 on Mac OS X Mozilla Firefox version before 18.0 on Mac OS X Thunderbird ESR version 10.x before 10.0.12 and 17.x before 17.0.1 on Mac OS X Mozilla Firefox ESR version 10.x before 10.0.12 and 17.x before 17.0.1 on Mac OS X
References