Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0750

Опубликовано: 08 янв. 2013
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5thunderbirdAffected
Red Hat Enterprise Linux 5thunderbirdFixedRHSA-2013:014508.01.2013
Red Hat Enterprise Linux 5firefoxFixedRHSA-2013:014408.01.2013
Red Hat Enterprise Linux 5xulrunnerFixedRHSA-2013:014408.01.2013
Red Hat Enterprise Linux 6firefoxFixedRHSA-2013:014408.01.2013
Red Hat Enterprise Linux 6xulrunnerFixedRHSA-2013:014408.01.2013
Red Hat Enterprise Linux 6thunderbirdFixedRHSA-2013:014508.01.2013

Показывать по

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=892145Mozilla: Buffer overflow in Javascript string concatenation (MFSA 2013-12)

EPSS

Процентиль: 88%
0.0381
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

nvd
почти 13 лет назад

Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

debian
почти 13 лет назад

Integer overflow in the JavaScript implementation in Mozilla Firefox b ...

github
больше 3 лет назад

Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

oracle-oval
почти 13 лет назад

ELSA-2013-0145: thunderbird security update (CRITICAL)

EPSS

Процентиль: 88%
0.0381
Низкий

6.8 Medium

CVSS2