Upstream information

CVE-2008-2811 at MITRE


The block reflow implementation in Mozilla Firefox before, Thunderbird and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 10
Vector AV:N/AC:L/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entry: 400757 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.0
  • seamonkey-debuginfo >= 1.1.11-3.1
  • seamonkey-debugsource >= 1.1.11-3.1
openSUSE 11.0
  • seamonkey >= 1.1.11-3.1
  • seamonkey-dom-inspector >= 1.1.11-3.1
  • seamonkey-irc >= 1.1.11-3.1
  • seamonkey-mail >= 1.1.11-3.1
  • seamonkey-spellchecker >= 1.1.11-3.1
  • seamonkey-venkman >= 1.1.11-3.1