Mozilla Firefox/Thunderbird/Seamonkey Multiple Memory Corruption Vulnerabilities UPDATED
23 Aug. 2012
Summary
Mozilla Firefox, Thunderbird and Seamonkey are prone to multiple remote memory-corruption vulnerabilities.
Credit:
The original article can be found at: http://www.securityfocus.com/bid/51756
The information has been provided by Bob Clary, Ben Hawkes, Christian Holler, Honza Bombas, Jason Orendorff, Jesse Ruderman, Jan Odvarko, Peter Van Der Beken, and Bill McCloskey.
Vulnerable Systems:
* Mozilla Thunderbird 3.1.14 and prior
Successful exploits may allow an attacker to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition.
Vendor Status:
Vendor as issued an updated vulnerability.