|
|
|
|
| |
Credit:
The original article can be found at: http://www.securityfocus.com/bid/51133
The information has been provided by Alexandre Poirot, Chris Blizzard, Kyle Huey, Scoobidiver, Christian Holler, David Baron, Gary Kwong, Jim Blandy, Bob Clary, Jesse Ruderman, Marcia Knous, and Rober Longson.
|
| |
Vulnerable Systems:
* Mozilla Thunderbird 8.0
* Mozilla Thunderbird 7.0.1
* Mozilla Thunderbird 7.0
* Mozilla Thunderbird 6.0.2
* Mozilla Thunderbird 6.0.1
* Mozilla Thunderbird 6.0
* Mozilla Thunderbird 6
* Mozilla Thunderbird 6
* Mozilla Thunderbird 5.0
* Mozilla Thunderbird 5
* Mozilla SeaMonkey 2.0.11
* Mozilla SeaMonkey 2.0.11
* Mozilla SeaMonkey 2.0.9
* Mozilla SeaMonkey 2.0.8
* Mozilla SeaMonkey 2.0.5
* Mozilla SeaMonkey 2.0.4
* Mozilla SeaMonkey 2.0.3
* Mozilla SeaMonkey 2.0.2
* Mozilla SeaMonkey 2.0.1
* Mozilla SeaMonkey 2.4
* Mozilla SeaMonkey 2.3
* Mozilla SeaMonkey 2.2
* Mozilla SeaMonkey 2.1
* Mozilla SeaMonkey 2.0.9
* Mozilla SeaMonkey 2.0.7
* Mozilla SeaMonkey 2.0.6
* Mozilla SeaMonkey 2.0.5
* Mozilla SeaMonkey 2.0.4
* Mozilla SeaMonkey 2.0.14
* Mozilla SeaMonkey 2.0.13
* Mozilla SeaMonkey 2.0.12
* Mozilla SeaMonkey 2.0.10
* Mozilla Firefox 8.0.1
* Mozilla Firefox 8.0
* Mozilla Firefox 7.0.1
* Mozilla Firefox 7.0
* Mozilla Firefox 7
* Mozilla Firefox 6.0.2
* Mozilla Firefox 6.0.1
* Mozilla Firefox 6.0
* Mozilla Firefox 6
* Mozilla Firefox 5.0.1
* Mozilla Firefox 5.0
* Mozilla Firefox 4.0.1
* Mozilla Firefox 4.0
Non-Vulnerable Systems:
* Mozilla Thunderbird 9.0
* Mozilla SeaMonkey 2.6
* Mozilla Firefox 9.0
Attackers can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Vendor Status:
Mozilla as issued an update for this vulnerablity
Patch Availability:
http://www.mozilla.org/en-US/products/download.html?product=firefox-12.0&os=win&lang=en-US
CVE Information:
CVE-2011-3660
Disclosure Timeline:
Initial Release Feb 09 2012
|
|
|
|
|