← Volver a CVEs
CVE-2010-3183
N/ADescripcion
The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado10/21/2010
Ultima modificacion4/29/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
mozilla:firefoxmozilla:seamonkeymozilla:thunderbird
Debilidades (CWE)
CWE-119
Referencias
http://secunia.com/advisories/42867(cve@mitre.org)
http://support.avaya.com/css/P8/documents/100120156(cve@mitre.org)
http://www.debian.org/security/2010/dsa-2124(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2010-0782.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2010-0861.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2010-0896.html(cve@mitre.org)
http://www.securityfocus.com/bid/44249(cve@mitre.org)
http://www.ubuntu.com/usn/USN-997-1(cve@mitre.org)
http://www.ubuntu.com/usn/USN-998-1(cve@mitre.org)
http://www.vupen.com/english/advisories/2011/0061(cve@mitre.org)
http://www.zerodayinitiative.com/advisories/ZDI-10-219/(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=598669(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11891(cve@mitre.org)
http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050077.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050154.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42867(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/css/P8/documents/100120156(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2010/dsa-2124(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:210(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:211(af854a3a-2127-422b-91ae-364da2661108)
http://www.mozilla.org/security/announce/2010/mfsa2010-67.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0782.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0861.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0896.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/44249(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-997-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-998-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0061(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-10-219/(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=598669(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11891(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.