Versio.io

CVE-2011-2373

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 21-06-2011 02:00
Last modified: - 21-06-2011 02:00
Total changes: - 10

Description

CVE-2011-2373 Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)

Common Vulnerability Scoring System (CVSS)

AV:N/AC:M/Au:N/C:P/I:P/A:P
Low
Attack complexity
Network
Attack vector
Low
Availability
Low
Confidentiality
Low
Integrity
-
Privileges required
-
Scope
-
User interaction
6.8
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=firefox-0 AND versionEndExcluding=3.6.18-2.el4
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=4
AND
product=thunderbird-0 AND versionEndExcluding=1.5.0.12-39.el4
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=4
AND
product=seamonkey-0 AND versionEndExcluding=1.0.9-71.el4
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=4
AND
product=firefox-0 AND versionEndExcluding=3.6.18-1.el5_6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=xulrunner-0 AND versionEndExcluding=1.9.2.18-2.el5_6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=thunderbird-0 AND versionEndExcluding=2.0.0.24-18.el5_6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=firefox-0 AND versionEndExcluding=3.6.18-1.el6_1
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
AND
product=xulrunner-0 AND versionEndExcluding=1.9.2.18-2.el6_1
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
AND
product=thunderbird AND version=
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
 

Reference

 


Keywords

REDHAT

 

CVE-2011-2373

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.