Skip to navigation

CVE Database

CVE-2010-3765

Impact: Critical
Public: 2010-10-28
Bugzilla: 646997: CVE-2010-3765 Firefox race condition flaw (MFSA 2010-73)

Details

The MITRE CVE dictionary describes this issue as:

Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.

Find out more about CVE-2010-3765 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 6.8
Base Metrics: AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
RHEL Optional Productivity Applications version 5 (thunderbird) RHSA-2010:0812 October 29, 2010
Red Hat Enterprise Linux Desktop version 5 (thunderbird) RHSA-2010:0812 October 29, 2010
Red Hat Enterprise Linux version 3 (seamonkey) RHSA-2010:0810 October 27, 2010
Red Hat Enterprise Linux version 4 (firefox) RHSA-2010:0808 October 27, 2010
Red Hat Enterprise Linux version 4 (seamonkey) RHSA-2010:0810 October 27, 2010
Red Hat Enterprise Linux version 4 (thunderbird) RHSA-2010:0812 October 29, 2010
Red Hat Enterprise Linux version 5 (xulrunner) RHSA-2010:0809 October 27, 2010
Red Hat Enterprise Linux version 6 (firefox) RHSA-2010:0861 November 10, 2010
Red Hat Enterprise Linux version 6 (thunderbird) RHSA-2010:0896 November 17, 2010

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.