Summary
The host is installed with Mozilla Firefox, Seamonkey or Thunderbird and is prone to multiple vulnerabilities.
Impact
Successful exploitation will let remote attackers to execute arbitrary code or cause a denial of service.
Impact Level: System/Application
Solution
Upgrade to Firefox version 3.6.18, 5.0 or later
http://www.mozilla.com/en-US/firefox/all.html
Upgrade to Seamonkey version 2.2 or later
http://www.seamonkey-project.org/releases/
Upgrade to Thunderbird version 3.1.11 or later
http://www.mozillamessaging.com/en-US/thunderbird/
Insight
- An integer overflow error in the 'Array.reduceRight' method allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
- A use-after-free error exists when handling XUL documents.
- An error when processing images with the 'multipart/x-mixed-replace' MIME type can be exploited to corrupt memory.
Affected
Thunderbird version before 3.1.11.
SeaMonkey versions 2.0.14 and prior.
Mozilla Firefox versions before 3.6.18 and 4.x through 4.0.1
References
Severity
Classification
-
CVE CVE-2011-2371, CVE-2011-2373, CVE-2011-2377 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities