Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047282.html
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html
http://secunia.com/advisories/42867
http://support.avaya.com/css/P8/documents/100112690
http://www.mandriva.com/security/advisories?name=MDVSA-2010:173
http://www.mozilla.org/security/announce/2010/mfsa2010-53.html
http://www.securityfocus.com/bid/43102
http://www.vupen.com/english/advisories/2010/2323
http://www.vupen.com/english/advisories/2011/0061
https://bugzilla.mozilla.org/show_bug.cgi?id=579655
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12186