Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-3970

Опубликовано: 28 авг. 2012
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-119
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=851922Mozilla: SVG buffer overflow and use-after-free issues (MFSA 2012-63)

EPSS

Процентиль: 85%
0.02743
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.

nvd
почти 13 лет назад

Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.

debian
почти 13 лет назад

Use-after-free vulnerability in the nsTArray_base::Length function in ...

github
больше 3 лет назад

Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.

oracle-oval
почти 13 лет назад

ELSA-2012-1211: thunderbird security update (CRITICAL)

EPSS

Процентиль: 85%
0.02743
Низкий

6.8 Medium

CVSS2