You are currently viewing a snapshot of taken on April 21, 2008. Most of this content is highly out of date (some pages haven't been updated since the project began in 1998) and exists for historical purposes only. If there are any pages on this archive site that you think should be added back to, please file a bug.

You are here: Known Vulnerabilities in Mozilla Products (Firefox > MFSA 2006-02

Mozilla Foundation Security Advisory 2006-02

Title: Changing position:relative to static corrupts memory
Severity: Moderate
Date: February 1, 2006
Reporter: Martijn Wargers
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox
  SeaMonkey 1.0


Dynamically changing the style of an element from position:relative to position:static can cause Gecko to operate on freed memory. It may be possible to exploit this in order to run arbitrary code.

This flaw was introduced during Firefox 1.5 and SeaMonkey 1.0 development and does not affect Firefox 1.0 or the Mozilla Suite 1.7

Thunderbird 1.5 could be vulnerable if JavaScript is enabled in mail. This is not the default setting and we strongly discourage users from turning on JavaScript in mail. Thunderbird is not vulnerable in its default configuration.

Update (13 April 2006)
This flaw has been fixed in Thunderbird


Upgrade to the fixed versions. Do not enable JavaScript in Thunderbird or SeaMonkey mail.