Vulnerability Description
Use-after-free vulnerability in the nsHTMLSelectElement function in nsHTMLSelectElement.cpp in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allows remote attackers to execute arbitrary code via vectors involving removal of the parent node of an element.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | 4.0 |
| Mozilla | Seamonkey | <= 2.5 |
| Mozilla | Thunderbird | 5.0 |
Related Weaknesses (CWE)
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-41.htmlVendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=739343
- http://www.mozilla.org/security/announce/2012/mfsa2012-41.htmlVendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=739343
FAQ
What is CVE-2011-3671?
CVE-2011-3671 is a vulnerability with a CVSS score of 7.5 (HIGH). Use-after-free vulnerability in the nsHTMLSelectElement function in nsHTMLSelectElement.cpp in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allows remote atta...
How severe is CVE-2011-3671?
CVE-2011-3671 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3671?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird.