Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0981.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0982.html - Third Party Advisory | |
References | () http://www.debian.org/security/2013/dsa-2716 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2013/dsa-2720 - Mailing List, Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2013/mfsa2013-53.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/60778 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1890-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1891-1 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=857883 - Issue Tracking | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=901365 - Issue Tracking | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16996 - Broken Link |
21 Oct 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE |
09 Jul 2024, 18:25
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 8.8 |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0981.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0982.html - Third Party Advisory | |
References | () http://www.debian.org/security/2013/dsa-2716 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2013/dsa-2720 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/60778 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1890-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1891-1 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=857883 - Issue Tracking | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=901365 - Issue Tracking | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16996 - Broken Link | |
CPE | cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:* |
cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:* cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:* cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:vmware:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* |
First Time |
Redhat enterprise Linux Server Aus
Canonical ubuntu Linux Suse Redhat gluster Storage Server For On-premise Opensuse opensuse Suse linux Enterprise Desktop Debian debian Linux Redhat enterprise Linux Eus Redhat enterprise Linux Server Opensuse Suse linux Enterprise Server Debian Suse linux Enterprise Software Development Kit Redhat Canonical Redhat enterprise Linux Desktop Redhat enterprise Linux Workstation |
Information
Published : 2013-06-26 03:19
Updated : 2025-04-11 00:51
NVD link : CVE-2013-1690
Mitre link : CVE-2013-1690
CVE.ORG link : CVE-2013-1690
JSON object : View
Products Affected
debian
- debian_linux
opensuse
- opensuse
redhat
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server
- gluster_storage_server_for_on-premise
- enterprise_linux_desktop
- enterprise_linux_server_aus
mozilla
- thunderbird_esr
- thunderbird
- firefox
suse
- linux_enterprise_software_development_kit
- linux_enterprise_desktop
- linux_enterprise_server
canonical
- ubuntu_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer