Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16911
https://bugzilla.mozilla.org/show_bug.cgi?id=744541
http://www.mozilla.org/security/announce/2012/mfsa2012-40.html
http://www.mandriva.com/security/advisories?name=MDVSA-2012:088
http://www.debian.org/security/2012/dsa-2489
http://www.debian.org/security/2012/dsa-2488
http://rhn.redhat.com/errata/RHSA-2012-0715.html
http://rhn.redhat.com/errata/RHSA-2012-0710.html
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html