← Zuruck zu CVEs
CVE-2010-3183
N/ABeschreibung
The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht10/21/2010
Zuletzt geandert4/29/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
mozilla:firefoxmozilla:seamonkeymozilla:thunderbird
Schwachen (CWE)
CWE-119
Referenzen
http://secunia.com/advisories/42867(cve@mitre.org)
http://support.avaya.com/css/P8/documents/100120156(cve@mitre.org)
http://www.debian.org/security/2010/dsa-2124(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2010-0782.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2010-0861.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2010-0896.html(cve@mitre.org)
http://www.securityfocus.com/bid/44249(cve@mitre.org)
http://www.ubuntu.com/usn/USN-997-1(cve@mitre.org)
http://www.ubuntu.com/usn/USN-998-1(cve@mitre.org)
http://www.vupen.com/english/advisories/2011/0061(cve@mitre.org)
http://www.zerodayinitiative.com/advisories/ZDI-10-219/(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=598669(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11891(cve@mitre.org)
http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050077.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050154.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42867(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/css/P8/documents/100120156(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2010/dsa-2124(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:210(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:211(af854a3a-2127-422b-91ae-364da2661108)
http://www.mozilla.org/security/announce/2010/mfsa2010-67.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0782.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0861.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0896.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/44249(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-997-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-998-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0061(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-10-219/(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=598669(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11891(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.