You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2010-65

Mozilla Foundation Security Advisory 2010-65

Title: Buffer overflow and memory corruption using document.write
Impact: Critical
Announced: October 19, 2010
Reporter: Alexander Miller
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.6.11
  Firefox 3.5.14
  Thunderbird 3.1.5
  Thunderbird 3.0.9
  SeaMonkey 2.0.9


Security researcher Alexander Miller reported that passing an excessively long string to document.write could cause text rendering routines to end up in an inconsistent state with sections of stack memory being overwritten with the string data. An attacker could use this flaw to crash a victim's browser and potentially run arbitrary code on their computer.