Revision Date: | 2014-10-06 | Version: | 23 |
Title: | Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader. |
Description: | Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader. |
Family: | windows | Class: | vulnerability |
Status: | ACCEPTED | Reference(s): | CVE-2011-2988
|
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows XP
| Product(s): | Mozilla Firefox
|
Definition Synopsis |
Determine if the version of Mozilla Firefox is equal to 4.0 Mozilla Firefox Mainline release is installed
AND Check for vulnerable version
Mozilla Firefox Mainline version is equal to 4.0
OR Determine if the version of Mozilla Firefox is equal to 5.0
Mozilla Firefox Mainline release is installed
AND Check for vulnerable version
Mozilla Firefox Mainline version is equal to 5.0
|