|
|
|
|
| |
Credit:
The original article can be found at: http://www.securityfocus.com/bid/49810
The information has been provided by Benjamin Smedberg, Bob Clary, and Jesse Ruderman.
|
| |
Vulnerable Systems:
* Mozilla Firefox 3.6.13
* Mozilla Firefox 3.6.13
* Mozilla Firefox 3.6.10
* Mozilla Firefox 3.6.9
* Mozilla Firefox 3.6.8
* Mozilla Firefox 3.6.6
* Mozilla Firefox 3.6.4
* Mozilla Firefox 3.6.3
* Mozilla Firefox 3.6.2
* Mozilla Firefox 3.6.2
* Mozilla Firefox 6
* Mozilla Firefox 3.6.7
* Mozilla Firefox 3.6.6
* Mozilla Firefox 3.6.20
* Mozilla Firefox 3.6.19
* Mozilla Firefox 3.6.18
* Mozilla Firefox 3.6.17
* Mozilla Firefox 3.6.16
* Mozilla Firefox 3.6.15
* Mozilla Firefox 3.6.14
* Mozilla Firefox 3.6.12
* Mozilla Firefox 3.6.11
* Mozilla Firefox 3.6
Non-Vulnerable Systems:
* Mozilla Firefox 7
* Mozilla Firefox 3.6.23
The issue occurs when parsing specially crafted files and can be exploited to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Vendor Status:
Mozilla as issued an update for this vulnerablity
Patch Availability:
http://www.mozilla.org/en-US/products/download.html?product=firefox-12.0&os=win&lang=en-US
CVE Information:
CVE-2011-2995
Disclosure Timeline:
Initial Release Sep 27 2011
|
|
|
|
|