CVE-2008-2785

NameCVE-2008-2785
DescriptionMozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1614-1, DSA-1615-1, DSA-1621-1, DSA-1697-1
Debian Bugs488358, 491161, 491163

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
iceapesourceetch1.0.13~pre080614i-0etch1DSA-1697-1
iceapesource(unstable)1.1.11-1491163
icedovesourceetch1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1DSA-1621-1
icedovesource(unstable)2.0.0.16-1
iceweaselsourceetch2.0.0.16-0etch1DSA-1614-1
iceweaselsource(unstable)3.0medium488358
xulrunnersourceetch1.8.0.15~pre080614d-0etch1DSA-1615-1
xulrunnersource(unstable)1.9.0.1-1491161

Notes

Since 3.0 iceweasel links against xulrunner, marking it as fixed, since also need to track etch
http://www.mozilla.org/security/announce/2008/mfsa2008-34.html

Search for package or bug name: Reporting problems