DescriptionHeap-based buffer overflow in Mozilla Firefox 2.x before, 1.5.x before, Thunderbird before, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by setting the CSS cursor to certain images that cause an incorrect size calculation when converting to a Windows bitmap.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid123.0-1fixed
icedove (PTS)jessie1:52.3.0-4~deb8u2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)(not affected)
iceapesource(unstable)(not affected)
icedovesource(unstable)(not affected)
iceweaselsource(unstable)(not affected)
mozillasource(unstable)(not affected)
mozilla-firefoxsource(unstable)(not affected)
mozilla-thunderbirdsource(unstable)(not affected)
xulrunnersource(unstable)(not affected)


- iceweasel <not-affected> (windows only)
- xulrunner <not-affected> (Windows only)
- iceape <not-affected> (windows only)
- firefox <not-affected> (windows only)
- mozilla <not-affected> (windows only)
- mozilla-firefox <not-affected> (windows only)
- mozilla-thunderbird <not-affected> (windows only)
- icedove <not-affected> (windows only)

Search for package or bug name: Reporting problems