Red Hat Customer Portal

Skip to main content

CVE-2010-3179

Impact:
Critical
Public Date:
2010-10-19
Bugzilla:
642277: CVE-2010-3179 Mozilla buffer overflow and memory corruption using document.write

The MITRE CVE dictionary describes this issue as:

Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.

Find out more about CVE-2010-3179 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 6.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (firefox) RHSA-2010:0782 2010-10-19
Red Hat Enterprise Linux 6 (thunderbird) RHSA-2010:0896 2010-11-17
Red Hat Enterprise Linux 6 (firefox) RHSA-2010:0861 2010-11-10
Red Hat Enterprise Linux 4 (firefox) RHSA-2010:0782 2010-10-19

Affected Packages State

Platform Package State
Red Hat Enterprise Linux version 5 nss 3.12.8-1.el5 Fixed
Red Hat Enterprise Linux version 6 xulrunner 1.9.2.12-1.el6_0 Fixed
Red Hat Enterprise Linux version 4 nss 3.12.8-1.el4 Fixed
Red Hat Enterprise Linux version 5 xulrunner 1.9.2.11-2.el5 Fixed

Last Modified