Mozilla Products Multiple Vulnerabilities July-11 (Windows)

Summary
The host is installed with Mozilla Firefox, Seamonkey or Thunderbird and is prone to multiple vulnerabilities.
Impact
Successful exploitation will let remote attackers to disclose potentially sensitive information, execute arbitrary code or cause a denial of service. Impact Level: Application
Solution
Upgrade to Firefox version 3.6.18 or later http://www.mozilla.com/en-US/firefox/all.html Upgrade to Seamonkey version 2.2 or later http://www.seamonkey-project.org/releases/ Upgrade to Thunderbird version 3.1.11 or later http://www.mozillamessaging.com/en-US/thunderbird/
Insight
- Multiple use-after-free errors allows remote attackers to cause a denial of service or possibly execute arbitrary code. - An error in the way cookies are handled could lead to bypass the Same Origin Policy via Set-Cookie headers.
Affected
SeaMonkey versions 2.0.14 and prior. Thunderbird version before 3.1.11. Mozilla Firefox versions before 3.6.18.
References