Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly iterate through the characters in a text run, which allows remote attackers to execute arbitrary code via a crafted document.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16494
https://bugzilla.mozilla.org/show_bug.cgi?id=769120
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
http://www.ubuntu.com/usn/USN-1548-2
http://www.ubuntu.com/usn/USN-1548-1
http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
http://www.debian.org/security/2012/dsa-2556
http://www.debian.org/security/2012/dsa-2554
http://www.debian.org/security/2012/dsa-2553
http://rhn.redhat.com/errata/RHSA-2012-1211.html
http://rhn.redhat.com/errata/RHSA-2012-1210.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html