|Description||Mozilla Firefox before 188.8.131.52 and 3.x before 3.0.1, Thunderbird before 184.108.40.206, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)|
|References||DSA-1614-1, DSA-1615-1, DSA-1621-1, DSA-1697-1|
|Debian Bugs||488358, 491161, 491163|
Vulnerable and fixed packages
The table below lists information on source packages.
The information below is based on the following data on fixed versions.
Since 3.0 iceweasel links against xulrunner, marking it as fixed, since also need to track etch