CVE-2010-0159

N/A Unknown
Published: February 22, 2010 Modified: April 29, 2026
View on NVD

Description

The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036097.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036132.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00001.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://secunia.com/advisories/37242
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/38770
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/38772
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/38847
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2010/dsa-1999
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0112.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0113.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0153.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0154.html
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-895-1
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-896-1
Source: cve@mitre.org
Third Party Advisory
http://www.vupen.com/english/advisories/2010/0405
Source: cve@mitre.org
Third Party Advisory
http://www.vupen.com/english/advisories/2010/0650
Source: cve@mitre.org
Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=467005
Source: cve@mitre.org
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=501934
Source: cve@mitre.org
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=527567
Source: cve@mitre.org
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=528134
Source: cve@mitre.org
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=528300
Source: cve@mitre.org
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=530880
Source: cve@mitre.org
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=534082
Source: cve@mitre.org
Issue Tracking Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/56359
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035346.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035367.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035426.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036097.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036132.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/37242
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/38770
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/38772
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/38847
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2010/dsa-1999
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:042
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mozilla.org/security/announce/2010/mfsa2010-01.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0112.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0113.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0153.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0154.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-895-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-896-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2010/0405
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2010/0650
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=467005
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=501934
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=527567
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=528134
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=528300
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=530880
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=534082
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/56359
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8485
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9590
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

62 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.5%
85th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

debian mozilla canonical