Mozilla products fail to properly release memory. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
For complete list of affected products refer to Mozilla Foundation Security Advisory 2006-44.
A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. The attacker could also cause the vulnerable application to crash.
Until it is possible to upgrade to a fixed version of Firefox or SeaMonkey, the following workaround will prevent exploitation:
This vulnerability was reported in Mozilla Foundation Security Advisory 2006-44 Mozilla credits Thilo Girmann with reporting this vulnerability.
This document was written by Jeff Gennari based on information from Mozilla.
|Date First Published:||2006-07-27|
|Date Last Updated:||2007-02-09 14:05 UTC|