CVE-2010-3765

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.

References

http://blog.mozilla.com/security/2010/10/26/critical-vulnerability-in-firefox-3-5-and-firefox-3-6/

http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox

http://isc.sans.edu/diary.html?storyid=9817

http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050233.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050061.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050077.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050154.html

http://norman.com/about_norman/press_center/news_archive/2010/129223/en?utm_source=twitterfeed&utm_medium=twitter

http://secunia.com/advisories/41761

http://secunia.com/advisories/41965

http://secunia.com/advisories/41966

http://secunia.com/advisories/41969

http://secunia.com/advisories/41975

http://secunia.com/advisories/42003

http://secunia.com/advisories/42008

http://secunia.com/advisories/42043

http://secunia.com/advisories/42867

http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.556706

http://support.avaya.com/css/P8/documents/100114329

http://support.avaya.com/css/P8/documents/100114335

http://www.debian.org/security/2010/dsa-2124

http://www.exploit-db.com/exploits/15341

http://www.exploit-db.com/exploits/15342

http://www.exploit-db.com/exploits/15352

http://www.mandriva.com/security/advisories?name=MDVSA-2010:213

http://www.mandriva.com/security/advisories?name=MDVSA-2010:219

http://www.mozilla.org/security/announce/2010/mfsa2010-73.html

http://www.norman.com/about_norman/press_center/news_archive/2010/129223/

http://www.norman.com/security_center/virus_description_archive/129146/

http://www.redhat.com/support/errata/RHSA-2010-0808.html

http://www.redhat.com/support/errata/RHSA-2010-0809.html

http://www.redhat.com/support/errata/RHSA-2010-0810.html

http://www.redhat.com/support/errata/RHSA-2010-0861.html

http://www.redhat.com/support/errata/RHSA-2010-0896.html

http://www.securityfocus.com/bid/44425

http://www.securitytracker.com/id?1024645

http://www.securitytracker.com/id?1024650

http://www.securitytracker.com/id?1024651

http://www.ubuntu.com/usn/usn-1011-1

http://www.ubuntu.com/usn/USN-1011-2

http://www.ubuntu.com/usn/USN-1011-3

http://www.vupen.com/english/advisories/2010/2837

http://www.vupen.com/english/advisories/2010/2857

http://www.vupen.com/english/advisories/2010/2864

http://www.vupen.com/english/advisories/2010/2871

http://www.vupen.com/english/advisories/2011/0061

https://bugzilla.mozilla.org/show_bug.cgi?id=607222

https://bugzilla.mozilla.org/show_bug.cgi?id=607222#c53

https://bugzilla.redhat.com/show_bug.cgi?id=646997

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12108

https://rhn.redhat.com/errata/RHSA-2010-0812.html

Details

Source: MITRE

Published: 2010-10-28

Updated: 2017-09-19

Type: CWE-119

Risk Information

CVSS v2

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*

Tenable Plugins

View all (61 total)

IDNameProductFamilySeverity
75734openSUSE Security Update : seamonkey (seamonkey-3428)NessusSuSE Local Security Checks
high
75671openSUSE Security Update : mozilla-xulrunner191 (mozilla-xulrunner191-3421)NessusSuSE Local Security Checks
high
75661openSUSE Security Update : MozillaThunderbird (MozillaThunderbird-3429)NessusSuSE Local Security Checks
high
75648openSUSE Security Update : MozillaFirefox (MozillaFirefox-3422)NessusSuSE Local Security Checks
high
68131Oracle Linux 4 : thunderbird (ELSA-2010-0812)NessusOracle Linux Local Security Checks
high
68129Oracle Linux 3 / 4 : seamonkey (ELSA-2010-0810)NessusOracle Linux Local Security Checks
high
68128Oracle Linux 5 : xulrunner (ELSA-2010-0809)NessusOracle Linux Local Security Checks
high
68127Oracle Linux 4 : firefox (ELSA-2010-0808)NessusOracle Linux Local Security Checks
high
63402GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)NessusGentoo Local Security Checks
critical
60905Scientific Linux Security Update : thunderbird on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
high
60889Scientific Linux Security Update : firefox on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
high
60880Scientific Linux Security Update : xulrunner on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
60879Scientific Linux Security Update : seamonkey on SL3.x, SL4.x i386/x86_64NessusScientific Linux Local Security Checks
high
60878Scientific Linux Security Update : firefox on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
high
50952SuSE 11 / 11.1 Security Update : Mozilla XULrunner (SAT Patch Numbers 3557 / 3558)NessusSuSE Local Security Checks
high
50876SuSE 11 / 11.1 Security Update : Mozilla Firefox (SAT Patch Numbers 3455 / 3456)NessusSuSE Local Security Checks
high
50803CentOS 4 / 5 : thunderbird (CESA-2010:0812)NessusCentOS Local Security Checks
high
50801CentOS 3 / 4 : seamonkey (CESA-2010:0810)NessusCentOS Local Security Checks
high
50800CentOS 5 : xulrunner (CESA-2010:0809)NessusCentOS Local Security Checks
high
50799CentOS 4 : firefox (CESA-2010:0808)NessusCentOS Local Security Checks
high
50648RHEL 6 : thunderbird (RHSA-2010:0896)NessusRed Hat Local Security Checks
high
50633RHEL 6 : firefox (RHSA-2010:0861)NessusRed Hat Local Security Checks
high
50467openSUSE Security Update : seamonkey (seamonkey-3428)NessusSuSE Local Security Checks
high
50466openSUSE Security Update : mozilla-xulrunner191 (mozilla-xulrunner191-3421)NessusSuSE Local Security Checks
high
50465openSUSE Security Update : MozillaThunderbird (MozillaThunderbird-3429)NessusSuSE Local Security Checks
high
50464openSUSE Security Update : MozillaFirefox (MozillaFirefox-3422)NessusSuSE Local Security Checks
high
50463openSUSE Security Update : seamonkey (seamonkey-3428)NessusSuSE Local Security Checks
high
50462openSUSE Security Update : mozilla-xulrunner191 (mozilla-xulrunner191-3421)NessusSuSE Local Security Checks
high
50461openSUSE Security Update : MozillaThunderbird (MozillaThunderbird-3429)NessusSuSE Local Security Checks
high
50460openSUSE Security Update : MozillaFirefox (MozillaFirefox-3422)NessusSuSE Local Security Checks
high
50459Fedora 14 : seamonkey-2.0.10-1.fc14 (2010-17105)NessusFedora Local Security Checks
high
50453Debian DSA-2124-1 : xulrunner - several vulnerabilitiesNessusDebian Local Security Checks
high
50445Mandriva Linux Security Advisory : mozilla-thunderbird (MDVSA-2010:219)NessusMandriva Local Security Checks
high
50427Slackware 12.2 / 13.0 / 13.1 / current : seamonkey (SSA:2010-305-01)NessusSlackware Local Security Checks
high
50422Fedora 12 : firefox-3.5.15-1.fc12 / galeon-2.0.7-27.fc12 / gnome-python2-extras-2.25.3-22.fc12 / etc (2010-16885)NessusFedora Local Security Checks
high
50412Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : xulrunner-1.9.1, xulrunner-1.9.2 vulnerability (USN-1011-3)NessusUbuntu Local Security Checks
high
50411Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : thunderbird vulnerability (USN-1011-2)NessusUbuntu Local Security Checks
high
50408RHEL 4 / 5 : thunderbird (RHSA-2010:0812)NessusRed Hat Local Security Checks
high
50406Mandriva Linux Security Advisory : xulrunner (MDVSA-2010:213)NessusMandriva Local Security Checks
high
50404FreeBSD : mozilla -- Heap buffer overflow mixing document.write and DOM insertion (c223b00d-e272-11df-8e32-000f20797ede)NessusFreeBSD Local Security Checks
high
50403Fedora 14 : firefox-3.6.12-1.fc14 / galeon-2.0.7-35.fc14.1 / gnome-python2-extras-2.25.3-25.fc14.1 / etc (2010-16897)NessusFedora Local Security Checks
high
50402Fedora 13 : firefox-3.6.12-1.fc13 / galeon-2.0.7-35.fc13 / gnome-python2-extras-2.25.3-24.fc13 / etc (2010-16883)NessusFedora Local Security Checks
high
801287Mozilla Thunderbird 3.0.x < 3.0.10 Buffer Overflow VulnerabilityLog Correlation EngineSMTP Clients
high
801274Mozilla Firefox 3.5.x < 3.5.15 Buffer Overflow VulnerabilityLog Correlation EngineWeb Clients
high
801269Mozilla SeaMonkey 2.0.x < 2.0.10 Buffer Overflow VulnerabilityLog Correlation EngineWeb Clients
high
801237Mozilla Thunderbird 3.1.x < 3.1.6 Buffer Overflow VulnerabilityLog Correlation EngineSMTP Clients
high
801223Mozilla Firefox 3.6.x < 3.6.12 Buffer Overflow VulnerabilityLog Correlation EngineWeb Clients
high
5694SeaMonkey 2.0.x < 2.0.10 Buffer OverflowNessus Network MonitorWeb Clients
medium
5693Mozilla Thunderbird 3.1.x < 3.1.6 Buffer OverflowNessus Network MonitorSMTP Clients
medium
5692Mozilla Thunderbird 3.0.x < 3.0.10 Buffer OverflowNessus Network MonitorSMTP Clients
medium
5691Mozilla Firefox 3.6.x < 3.6.12 Buffer Overflow VulnerabilityNessus Network MonitorWeb Clients
medium
5690Mozilla Firefox 3.5.x < 3.5.15 Buffer Overflow VulnerabilityNessus Network MonitorWeb Clients
medium
50386SeaMonkey < 2.0.10 Buffer OverflowNessusWindows
high
50385Mozilla Thunderbird 3.1 < 3.1.6 Buffer OverflowNessusWindows
high
50384Mozilla Thunderbird < 3.0.10 Buffer OverflowNessusWindows
high
50383Firefox 3.6 < 3.6.12 Buffer OverflowNessusWindows
high
50382Firefox < 3.5.15 Buffer OverflowNessusWindows
high
50378Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : firefox, firefox-3.0, firefox-3.5 vulnerability (USN-1011-1)NessusUbuntu Local Security Checks
high
50363RHEL 3 / 4 : seamonkey (RHSA-2010:0810)NessusRed Hat Local Security Checks
high
50362RHEL 5 : xulrunner (RHSA-2010:0809)NessusRed Hat Local Security Checks
high
50361RHEL 4 : firefox (RHSA-2010:0808)NessusRed Hat Local Security Checks
high