Mozilla Foundation Security Advisory 2010-65
Title: Buffer overflow and memory corruption using document.write
Announced: October 19, 2010
Reporter: Alexander Miller
Products: Firefox, Thunderbird, SeaMonkey
Fixed in: Firefox 3.6.11
Security researcher Alexander Miller reported that
passing an excessively long string to
could cause text rendering routines to end up in an inconsistent state
with sections of stack memory being overwritten with the string data.
An attacker could use this flaw to crash a victim's browser and
potentially run arbitrary code on their computer.