Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://secunia.com/advisories/50904 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/50984 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/50935 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/50856 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.debian.org/security/2012/dsa-2565 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://secunia.com/advisories/50892 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.debian.org/security/2012/dsa-2572 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://rhn.redhat.com/errata/RHSA-2012-1351.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://secunia.com/advisories/50936 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.mozilla.org/security/announce/2012/mfsa2012-86.html | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/51181 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://osvdb.org/86096 | vdb-entry x_refsource_OSVDB x_transferred |
http://secunia.com/advisories/55318 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html | vendor-advisory x_refsource_SUSE x_transferred |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:163 | vendor-advisory x_refsource_MANDRIVA x_transferred |
https://bugzilla.mozilla.org/show_bug.cgi?id=787722 | x_refsource_CONFIRM x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16964 | vdb-entry signature x_refsource_OVAL x_transferred |
http://www.ubuntu.com/usn/USN-1611-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://www.debian.org/security/2012/dsa-2569 | vendor-advisory x_refsource_DEBIAN x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79165 | vdb-entry x_refsource_XF x_transferred |
Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 9.3 | HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |