 
        | Release Date: | 2008-07-07 | |
| Impact: | Critical | What is this? | 
The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.
See more information about CVE-2008-2811 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 10.0 | 
| Vector String: | AV:N/AC:L/Au:N/C:C/I:C/A:C | 
| Version: | 2.0 | 
| Attack Vector: | Network | 
| Attack Complexity: | Low | 
| Authentication: | None | 
| Confidentiality Impact: | Complete | 
| Integrity Impact: | Complete | 
| Availability Impact: | Complete | 
| Platform | Errata | Release Date | 
| Oracle Enterprise Linux version 3 (seamonkey) | ELSA-2008-0547 | 2008-07-02 | 
| Oracle Enterprise Linux version 4 (firefox) | ELSA-2008-0549 | 2008-07-02 | 
| Oracle Enterprise Linux version 4 (seamonkey) | ELSA-2008-0547 | 2008-07-02 | 
| Oracle Enterprise Linux version 4 (thunderbird) | ELSA-2008-0616 | 2008-07-24 | 
| Oracle Linux version 5 (devhelp) | ELSA-2008-0569 | 2008-07-02 | 
| Oracle Linux version 5 (firefox) | ELSA-2008-0569 | 2008-07-02 | 
| Oracle Linux version 5 (xulrunner) | ELSA-2008-0569 | 2008-07-02 | 
| Oracle Linux version 5 (yelp) | ELSA-2008-0569 | 2008-07-02 | 
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: