Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-0470

Опубликовано: 24 апр. 2012
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=815020Mozilla: Invalid frees causes heap corruption in gfxImageSurface (MFSA 2012-23)

EPSS

Процентиль: 94%
0.13594
Средний

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 14 лет назад

Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."

nvd
почти 14 лет назад

Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."

debian
почти 14 лет назад

Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::Light ...

github
почти 4 года назад

Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."

oracle-oval
почти 14 лет назад

ELSA-2012-0516: thunderbird security update (CRITICAL)

EPSS

Процентиль: 94%
0.13594
Средний

6.8 Medium

CVSS2