Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-1941

Опубликовано: 05 июн. 2012
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-416
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=827843Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40)

EPSS

Процентиль: 90%
0.06289
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.

nvd
около 13 лет назад

Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.

debian
около 13 лет назад

Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypothet ...

github
около 3 лет назад

Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.

oracle-oval
около 13 лет назад

ELSA-2012-0715: thunderbird security update (CRITICAL)

EPSS

Процентиль: 90%
0.06289
Низкий

6.8 Medium

CVSS2