Mozilla Foundation Security Advisory 2008-33
Title: Crash and remote code execution in block reflow
Announced: July 1, 2008
Reporter: Astabis (iSIGHT Partners GVP Program)
Products: Firefox 2, Thunderbird 2, SeaMonkey
Fixed in: Firefox 220.127.116.11
Security research firm Astabis reported a vulnerability in Firefox 2 submitted through the iSIGHT Partners GVP Program by Greg McManus, Primary GVP Researcher. The reported crash in Mozilla's block reflow code could be used by an attacker to crash the browser and run arbitrary code on the victim's computer.
This vulnerability does not affect Firefox 3.