Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-0750

Опубликовано: 13 янв. 2013
Источник: ubuntu
Приоритет: medium
CVSS2: 9.3

Описание

Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

РелизСтатусПримечание
devel

released

19.0~b1+build2-0ubuntu1
hardy

ignored

end of life
lucid

released

18.0+build1-0ubuntu0.10.04.3
oneiric

released

18.0+build1-0ubuntu0.11.10.3
precise

released

18.0+build1-0ubuntu0.12.04.3
quantal

released

18.0+build1-0ubuntu0.12.10.3
raring

released

19.0~b1+build2-0ubuntu1
saucy

released

19.0~b1+build2-0ubuntu1
upstream

released

18.0

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

ignored

end of life
oneiric

ignored

end of life
precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

released

2.15

Показывать по

РелизСтатусПримечание
devel

released

17.0.2+build1-0ubuntu1
hardy

ignored

end of life
lucid

released

17.0.2+build1-0ubuntu0.10.04.1
oneiric

released

17.0.2+build1-0ubuntu0.11.10.1
precise

released

17.0.2+build1-0ubuntu0.12.04.1
quantal

released

17.0.2+build1-0ubuntu0.12.10.1
raring

released

17.0.2+build1-0ubuntu1
saucy

released

17.0.2+build1-0ubuntu1
upstream

released

17.0.2

Показывать по

9.3 Critical

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

nvd
больше 12 лет назад

Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

debian
больше 12 лет назад

Integer overflow in the JavaScript implementation in Mozilla Firefox b ...

github
больше 3 лет назад

Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

oracle-oval
больше 12 лет назад

ELSA-2013-0145: thunderbird security update (CRITICAL)

9.3 Critical

CVSS2