Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00261.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00198.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10197
https://exchange.xforce.ibmcloud.com/vulnerabilities/52252
https://bugzilla.mozilla.org/show_bug.cgi?id=459524
http://www.vupen.com/english/advisories/2010/0650
http://www.vupen.com/english/advisories/2009/2142
http://www.securitytracker.com/id?1022665
http://www.securityfocus.com/bid/35925
http://www.redhat.com/support/errata/RHSA-2010-0154.html
http://www.redhat.com/support/errata/RHSA-2010-0153.html
http://www.mozilla.org/security/announce/2009/mfsa2009-38.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1