Mozilla Firefox SeaMonkey and Thunderbird Multiple Memory Corruption Vulnerabilities UPDATED
29 Jul. 2012
Summary
Mozilla Firefox, Thunderbird, and SeaMonkey are prone to multiple memory-corruption vulnerabilities.
Credit:
The original article can be found at: http://www.securityfocus.com/bid/46645
The information has been provided by Jesse Ruderman, Igor Bukanov, Olli Pettay, Gary Kwong, Jeff Walden, Henry Sivonen, Martijn Wargers, David Baron and Marcia Knous.
Vulnerable Systems:
* Mozilla Thunderbird 3.1.7 and prior
Successful exploits may allow an attacker to execute arbitrary code in the context of the user running an affected application. Failed exploit attempts will result in a denial-of-service condition.
Vendor Status:
Vendor as issued an updated vulnerability.