Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0820.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0821.html - Third Party Advisory | |
References | () http://www.debian.org/security/2013/dsa-2699 - Mailing List | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:165 - Broken Link | |
References | () http://www.mozilla.org/security/announce/2013/mfsa2013-47.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/59858 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1822-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1823-1 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=866825 - Exploit, Issue Tracking | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16976 - Broken Link |
21 Oct 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE |
16 Jul 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0820.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0821.html - Third Party Advisory | |
References | () http://www.debian.org/security/2013/dsa-2699 - Mailing List | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:165 - Broken Link | |
References | () http://www.securityfocus.com/bid/59858 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1822-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1823-1 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=866825 - Exploit, Issue Tracking | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16976 - Broken Link | |
CPE | cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus_from_rhui:5.9:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.4_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus_from_rhui:6.4:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.4_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:5.9_ppc:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:5.9_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* |
First Time |
Redhat enterprise Linux For Scientific Computing
Canonical ubuntu Linux Redhat enterprise Linux For Ibm Z Systems Redhat gluster Storage Server For On-premise Redhat enterprise Linux Server Opensuse Redhat enterprise Linux For Ibm Z Systems Eus Canonical Redhat enterprise Linux Workstation Redhat enterprise Linux For Power Big Endian Eus Redhat enterprise Linux Server Aus Redhat enterprise Linux For Power Big Endian Opensuse opensuse Redhat enterprise Linux Server Eus From Rhui Debian debian Linux Redhat enterprise Linux Eus Debian Redhat Redhat enterprise Linux Desktop |
|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.5 |
CWE | CWE-665 |
Information
Published : 2013-05-16 11:45
Updated : 2025-04-11 00:51
NVD link : CVE-2013-1675
Mitre link : CVE-2013-1675
CVE.ORG link : CVE-2013-1675
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_server_eus_from_rhui
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_for_scientific_computing
- enterprise_linux_server
- gluster_storage_server_for_on-premise
- enterprise_linux_for_power_big_endian
- enterprise_linux_for_power_big_endian_eus
- enterprise_linux_desktop
- enterprise_linux_server_aus
opensuse
- opensuse
mozilla
- thunderbird_esr
- thunderbird
- firefox
canonical
- ubuntu_linux
CWE
CWE-665
Improper Initialization