Mozilla Products 'select()' Denial Of Service Vulnerability (Linux)

Summary
The host is installed with Mozilla Firefox/Seamonkey/Thunderbird and is prone to Denial of Service vulnerability.
Impact
Successful exploitation will let attackers to cause application crash by consuming the memory. Impact Level: Application
Solution
Upgrade to Firefox version 2.0.0.19 or 3.0.5 or later http://www.mozilla.com/en-US/firefox/all.html Upgrade to Seamonkey version 1.1.17 or later http://www.seamonkey-project.org/releases/ Apply patch for Thunderbird through above mozilla engine update http://www.mozillamessaging.com/ ***** NOTE: Ignore this warning if above mentioned patch is already applied. *****
Insight
A null pointer dereference error occurs while calling the 'select' method with a large integer, that results in continuous allocation of x+n bytes of memory, exhausting memory after a while.
Affected
Seamonkey version prior to 1.1.17 Thunderbird version 2.0.0.22 and prior Firefox version before 2.0.0.19 and 3.x before 3.0.5 on Linux.
References