CVE-2010-3131
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/08/2010
Last modified:
11/04/2025
Description
Untrusted search path vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Windows XP allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .htm, .html, .jtx, .mfp, or .eml file.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* | 2.0.6 (including) | |
| cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html
- http://secunia.com/advisories/41095
- http://secunia.com/advisories/41168
- http://www.exploit-db.com/exploits/14730
- http://www.exploit-db.com/exploits/14783
- http://www.mozilla.org/security/announce/2010/mfsa2010-52.html
- http://www.securityfocus.com/archive/1/513324/100/0/threaded
- http://www.vupen.com/english/advisories/2010/2169
- http://www.vupen.com/english/advisories/2010/2201
- http://www.vupen.com/english/advisories/2010/2323
- https://bugzilla.mozilla.org/show_bug.cgi?id=579593
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12143
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html
- http://secunia.com/advisories/41095
- http://secunia.com/advisories/41168
- http://www.exploit-db.com/exploits/14730
- http://www.exploit-db.com/exploits/14783
- http://www.mozilla.org/security/announce/2010/mfsa2010-52.html
- http://www.securityfocus.com/archive/1/513324/100/0/threaded
- http://www.vupen.com/english/advisories/2010/2169
- http://www.vupen.com/english/advisories/2010/2201
- http://www.vupen.com/english/advisories/2010/2323
- https://bugzilla.mozilla.org/show_bug.cgi?id=579593
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12143



