The event-management implementation in Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly select the context for script to run in, which allows remote attackers to bypass the Same Origin Policy or execute arbitrary JavaScript code with chrome privileges via a crafted web site.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14512
https://bugzilla.mozilla.org/show_bug.cgi?id=650252
https://bugzilla.mozilla.org/show_bug.cgi?id=643450
https://bugzilla.mozilla.org/show_bug.cgi?id=614151
http://www.redhat.com/support/errata/RHSA-2011-1164.html
http://www.mozilla.org/security/announce/2011/mfsa2011-30.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:127
http://www.debian.org/security/2011/dsa-2297
http://www.debian.org/security/2011/dsa-2296
http://www.debian.org/security/2011/dsa-2295
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html