Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-6671
Vulnerability from cvelistv5
Published
2013-12-11 15:00
Modified
2024-08-06 17:46
Severity ?
EPSS score ?
Summary
The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:46:22.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:1958", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "name": "SUSE-SU-2013:1919", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" }, { "name": "openSUSE-SU-2013:1957", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "name": "FEDORA-2013-23127", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "name": "FEDORA-2013-23519", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "name": "1029470", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029470" }, { "name": "openSUSE-SU-2013:1917", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "name": "openSUSE-SU-2013:1959", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "name": "GLSA-201504-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201504-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "openSUSE-SU-2013:1916", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "name": "openSUSE-SU-2014:0008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "name": "1029476", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029476" }, { "name": "64212", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64212" }, { "name": "openSUSE-SU-2013:1918", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "name": "FEDORA-2013-23291", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "name": "USN-2052-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=930281" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html" }, { "name": "RHSA-2013:1812", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1812.html" }, { "name": "USN-2053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2053-1" }, { "name": "FEDORA-2013-23295", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "openSUSE-SU-2013:1958", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "name": "SUSE-SU-2013:1919", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" }, { "name": "openSUSE-SU-2013:1957", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "name": "FEDORA-2013-23127", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "name": "FEDORA-2013-23519", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "name": "1029470", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029470" }, { "name": "openSUSE-SU-2013:1917", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "name": "openSUSE-SU-2013:1959", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "name": "GLSA-201504-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201504-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "openSUSE-SU-2013:1916", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "name": "openSUSE-SU-2014:0008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "name": "1029476", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029476" }, { "name": "64212", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64212" }, { "name": "openSUSE-SU-2013:1918", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "name": "FEDORA-2013-23291", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "name": "USN-2052-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=930281" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html" }, { "name": "RHSA-2013:1812", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1812.html" }, { "name": "USN-2053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2053-1" }, { "name": "FEDORA-2013-23295", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2013-6671", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:1958", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "name": "SUSE-SU-2013:1919", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" }, { "name": "openSUSE-SU-2013:1957", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "name": "FEDORA-2013-23127", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "name": "FEDORA-2013-23519", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "name": "1029470", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029470" }, { "name": "openSUSE-SU-2013:1917", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "name": "openSUSE-SU-2013:1959", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "name": "GLSA-201504-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201504-01" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "openSUSE-SU-2013:1916", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "name": "openSUSE-SU-2014:0008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "name": "1029476", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029476" }, { "name": "64212", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64212" }, { "name": "openSUSE-SU-2013:1918", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "name": "FEDORA-2013-23291", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "name": "USN-2052-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=930281", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=930281" }, { "name": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html" }, { "name": "RHSA-2013:1812", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1812.html" }, { "name": "USN-2053-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2053-1" }, { "name": "FEDORA-2013-23295", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2013-6671", "datePublished": "2013-12-11T15:00:00", "dateReserved": "2013-11-05T00:00:00", "dateUpdated": "2024-08-06T17:46:22.682Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-6671\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2013-12-11T15:55:13.120\",\"lastModified\":\"2024-11-21T01:59:31.807\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.\"},{\"lang\":\"es\",\"value\":\"L funci\u00f3n nsGfxScrollFrameInner::IsLTR en Mozilla Firefox anterior a 26.0, Firefox ESR 24.x anteriores a 24.2, Thunderbird anteriores a 24.2, y SeaMonkey anteriores a 2.23 permite a atacantes remotos ejecutar c\u00f3digo de forma arbitraria a trav\u00e9s del uso de c\u00f3digo JavaScript manipulado para listas ordenadas de elementos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.0\",\"matchCriteriaId\":\"50A3A702-C2B1-4311-9EBC-D62079E3DCD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"24.0\",\"versionEndExcluding\":\"24.2\",\"matchCriteriaId\":\"924CA671-D089-40FA-BE02-6938FD094713\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.23\",\"matchCriteriaId\":\"D337932C-EF9D-4511-87DB-54262C6635D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"24.2\",\"matchCriteriaId\":\"7BD42C60-4027-4EDE-A61B-84C80154A5C3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2076871-2E80-4605-A470-A41C1A8EC7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFAA48D9-BEB4-4E49-AD50-325C262D46D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F61F047-129C-41A6-8A27-FFCBB8563E91\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569964DA-31BE-4520-A66D-C3B09D557AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45010D45-2FF2-4B04-B115-6B6FE606D598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"835AE071-CEAE-49E5-8F0C-E5F50FB85EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3407560-6D54-4B1B-9977-AD4F6EB5D6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4BC592E-17CC-4DD4-8B2C-CFD99383649C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*\",\"matchCriteriaId\":\"0EA03350-8702-43D5-8605-5FB765A3F60B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:-:*:*:*\",\"matchCriteriaId\":\"A3E8BD00-CF9C-404F-A25C-8917A001A6D2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E14271AE-1309-48F3-B9C6-D7DEEC488279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5991814D-CA77-4C25-90D2-DB542B17E0AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1812.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2013/mfsa2013-111.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/64212\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1029470\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1029476\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2052-1\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2053-1\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=930281\",\"source\":\"security@mozilla.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201504-01\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1812.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2013/mfsa2013-111.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/64212\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1029470\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1029476\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2052-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2053-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=930281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201504-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2013_1812
Vulnerability from csaf_redhat
Published
2013-12-11 05:26
Modified
2024-11-25 11:56
Summary
Red Hat Security Advisory: firefox security update
Notes
Topic
Updated firefox packages that fix several security issues are now available
for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to terminate
unexpectedly or, potentially, execute arbitrary code with the privileges of
the user running Firefox. (CVE-2013-5609, CVE-2013-5616, CVE-2013-5618,
CVE-2013-6671, CVE-2013-5613)
A flaw was found in the way Firefox rendered web content with missing
character encoding information. An attacker could use this flaw to possibly
bypass same-origin inheritance and perform cross-site scripting (XSS)
attacks. (CVE-2013-5612)
It was found that certain malicious web content could bypass restrictions
applied by sandboxed iframes. An attacker could combine this flaw with
other vulnerabilities to execute arbitrary code with the privileges of the
user running Firefox. (CVE-2013-5614)
Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Ben Turner, Bobby Holley, Jesse Ruderman, Christian
Holler, Masato Kinugawa, Daniel Veditz, Jesse Schwartzentruber, Nils, Tyson
Smith, and Atte Kettunen as the original reporters of these issues.
For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 24.2.0 ESR. You can find a link to the Mozilla
advisories in the References section of this erratum.
All Firefox users should upgrade to these updated packages, which contain
Firefox version 24.2.0 ESR, which corrects these issues. After installing
the update, Firefox must be restarted for the changes to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated firefox packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to terminate\nunexpectedly or, potentially, execute arbitrary code with the privileges of\nthe user running Firefox. (CVE-2013-5609, CVE-2013-5616, CVE-2013-5618,\nCVE-2013-6671, CVE-2013-5613)\n\nA flaw was found in the way Firefox rendered web content with missing\ncharacter encoding information. An attacker could use this flaw to possibly\nbypass same-origin inheritance and perform cross-site scripting (XSS)\nattacks. (CVE-2013-5612)\n\nIt was found that certain malicious web content could bypass restrictions\napplied by sandboxed iframes. An attacker could combine this flaw with\nother vulnerabilities to execute arbitrary code with the privileges of the\nuser running Firefox. (CVE-2013-5614)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Ben Turner, Bobby Holley, Jesse Ruderman, Christian\nHoller, Masato Kinugawa, Daniel Veditz, Jesse Schwartzentruber, Nils, Tyson\nSmith, and Atte Kettunen as the original reporters of these issues.\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 24.2.0 ESR. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 24.2.0 ESR, which corrects these issues. After installing\nthe update, Firefox must be restarted for the changes to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1812", "url": "https://access.redhat.com/errata/RHSA-2013:1812" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html", "url": "http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html" }, { "category": "external", "summary": "1039417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039417" }, { "category": "external", "summary": "1039420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039420" }, { "category": "external", "summary": "1039421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039421" }, { "category": "external", "summary": "1039422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039422" }, { "category": "external", "summary": "1039423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039423" }, { "category": "external", "summary": "1039426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039426" }, { "category": "external", "summary": "1039429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039429" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1812.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-25T11:56:11+00:00", "generator": { "date": "2024-11-25T11:56:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1812", "initial_release_date": "2013-12-11T05:26:00+00:00", "revision_history": [ { "date": "2013-12-11T05:26:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-12-11T05:27:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T11:56:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "product_id": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el6_5.x86_64", "product": { "name": "firefox-0:24.2.0-1.el6_5.x86_64", "product_id": "firefox-0:24.2.0-1.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el5_10.x86_64", "product": { "name": "firefox-0:24.2.0-1.el5_10.x86_64", "product_id": "firefox-0:24.2.0-1.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "product_id": "firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el6_5.i686", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.i686", "product_id": "firefox-debuginfo-0:24.2.0-1.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el6_5?arch=i686" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el6_5.i686", "product": { "name": "firefox-0:24.2.0-1.el6_5.i686", "product_id": "firefox-0:24.2.0-1.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el6_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "firefox-0:24.2.0-1.el6_5.src", "product": { "name": "firefox-0:24.2.0-1.el6_5.src", "product_id": "firefox-0:24.2.0-1.el6_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el6_5?arch=src" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el5_10.src", "product": { "name": "firefox-0:24.2.0-1.el5_10.src", "product_id": "firefox-0:24.2.0-1.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "product_id": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el6_5?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el6_5.ppc", "product": { "name": "firefox-0:24.2.0-1.el6_5.ppc", "product_id": "firefox-0:24.2.0-1.el6_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el6_5?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el5_10.ppc", "product": { "name": "firefox-0:24.2.0-1.el5_10.ppc", "product_id": "firefox-0:24.2.0-1.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "product_id": "firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el5_10?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "product_id": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el6_5.ppc64", "product": { "name": "firefox-0:24.2.0-1.el6_5.ppc64", "product_id": "firefox-0:24.2.0-1.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el6_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390", "product_id": "firefox-debuginfo-0:24.2.0-1.el6_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el6_5?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el6_5.s390", "product": { "name": "firefox-0:24.2.0-1.el6_5.s390", "product_id": "firefox-0:24.2.0-1.el6_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el6_5?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el5_10.s390", "product": { "name": "firefox-0:24.2.0-1.el5_10.s390", "product_id": "firefox-0:24.2.0-1.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el5_10?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el5_10.s390", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.s390", "product_id": "firefox-debuginfo-0:24.2.0-1.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el5_10?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "product_id": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el6_5.s390x", "product": { "name": "firefox-0:24.2.0-1.el6_5.s390x", "product_id": "firefox-0:24.2.0-1.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:24.2.0-1.el5_10.s390x", "product": { "name": "firefox-0:24.2.0-1.el5_10.s390x", "product_id": "firefox-0:24.2.0-1.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "product_id": "firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el5_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:24.2.0-1.el5_10.i386", "product": { "name": "firefox-0:24.2.0-1.el5_10.i386", "product_id": "firefox-0:24.2.0-1.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el5_10?arch=i386" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el5_10.i386", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.i386", "product_id": "firefox-debuginfo-0:24.2.0-1.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-0:24.2.0-1.el5_10.ia64", "product": { "name": "firefox-0:24.2.0-1.el5_10.ia64", "product_id": "firefox-0:24.2.0-1.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.2.0-1.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "product": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "product_id": "firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.2.0-1.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386" }, "product_reference": "firefox-0:24.2.0-1.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64" }, "product_reference": "firefox-0:24.2.0-1.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc" }, "product_reference": "firefox-0:24.2.0-1.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390" }, "product_reference": "firefox-0:24.2.0-1.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x" }, "product_reference": "firefox-0:24.2.0-1.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src" }, "product_reference": "firefox-0:24.2.0-1.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64" }, "product_reference": "firefox-0:24.2.0-1.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386" }, "product_reference": "firefox-0:24.2.0-1.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64" }, "product_reference": "firefox-0:24.2.0-1.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc" }, "product_reference": "firefox-0:24.2.0-1.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390" }, "product_reference": "firefox-0:24.2.0-1.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x" }, "product_reference": "firefox-0:24.2.0-1.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src" }, "product_reference": "firefox-0:24.2.0-1.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64" }, "product_reference": "firefox-0:24.2.0-1.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686" }, "product_reference": "firefox-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc" }, "product_reference": "firefox-0:24.2.0-1.el6_5.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "firefox-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390" }, "product_reference": "firefox-0:24.2.0-1.el6_5.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x" }, "product_reference": "firefox-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src" }, "product_reference": "firefox-0:24.2.0-1.el6_5.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "firefox-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686" }, "product_reference": "firefox-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc" }, "product_reference": "firefox-0:24.2.0-1.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "firefox-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390" }, "product_reference": "firefox-0:24.2.0-1.el6_5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x" }, "product_reference": "firefox-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src" }, "product_reference": "firefox-0:24.2.0-1.el6_5.src", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "firefox-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686" }, "product_reference": "firefox-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc" }, "product_reference": "firefox-0:24.2.0-1.el6_5.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "firefox-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390" }, "product_reference": "firefox-0:24.2.0-1.el6_5.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x" }, "product_reference": "firefox-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src" }, "product_reference": "firefox-0:24.2.0-1.el6_5.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "firefox-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686" }, "product_reference": "firefox-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc" }, "product_reference": "firefox-0:24.2.0-1.el6_5.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "firefox-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390" }, "product_reference": "firefox-0:24.2.0-1.el6_5.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x" }, "product_reference": "firefox-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src" }, "product_reference": "firefox-0:24.2.0-1.el6_5.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "firefox-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Atte Kettunen" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-0772", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2013-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "911840" } ], "notes": [ { "category": "description", "text": "The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Out-of-bounds read in image rendering (MFSA 2013-22)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue has been addressed in firefox 24.2.0-ESR and thunderbird 24.2.0-ESR via RHSA-2013:1812 and RHSA-2013:1823.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0772" }, { "category": "external", "summary": "RHBZ#911840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=911840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0772", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0772" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-22.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-22.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T05:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1812" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Out-of-bounds read in image rendering (MFSA 2013-22)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] } ], "cve": "CVE-2013-5609", "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039417" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Miscellaneous memory safety hazards (rv:24.2) (MFSA 2013-104)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5609" }, { "category": "external", "summary": "RHBZ#1039417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039417" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5609", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5609" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5609", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5609" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-104.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-104.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T05:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1812" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Miscellaneous memory safety hazards (rv:24.2) (MFSA 2013-104)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Masato Kinugawa" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-5612", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039420" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Character encoding cross-origin XSS attack (MFSA 2013-106)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5612" }, { "category": "external", "summary": "RHBZ#1039420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039420" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5612", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5612" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-106.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-106.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T05:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1812" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Character encoding cross-origin XSS attack (MFSA 2013-106)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] } ], "cve": "CVE-2013-5613", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039429" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5613" }, { "category": "external", "summary": "RHBZ#1039429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5613", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5613" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-114.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-114.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T05:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1812" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Daniel Veditz" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-5614", "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039421" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Sandbox restrictions not applied to nested object elements (MFSA 2013-107)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5614" }, { "category": "external", "summary": "RHBZ#1039421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039421" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5614", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5614" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-107.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-107.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T05:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1812" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Mozilla: Sandbox restrictions not applied to nested object elements (MFSA 2013-107)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Jesse Schwartzentruber" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-5616", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039422" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free in event listeners (MFSA 2013-108)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5616" }, { "category": "external", "summary": "RHBZ#1039422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039422" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5616", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5616" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-108.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-108.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T05:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1812" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Use-after-free in event listeners (MFSA 2013-108)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Nils" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-5618", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039423" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free during Table Editing (MFSA 2013-109)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5618" }, { "category": "external", "summary": "RHBZ#1039423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5618", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5618" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5618", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5618" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-109.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-109.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T05:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1812" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Use-after-free during Table Editing (MFSA 2013-109)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Tyson Smith" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6671", "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039426" } ], "notes": [ { "category": "description", "text": "The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Segmentation violation when replacing ordered list elements (MFSA 2013-111)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6671" }, { "category": "external", "summary": "RHBZ#1039426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039426" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6671", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6671" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T05:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1812" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.2.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.2.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Segmentation violation when replacing ordered list elements (MFSA 2013-111)" } ] }
rhsa-2013_1823
Vulnerability from csaf_redhat
Published
2013-12-11 17:22
Modified
2024-11-25 11:56
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
Several flaws were found in the processing of malformed content.
Malicious content could cause Thunderbird to crash or, potentially, execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2013-5609, CVE-2013-5616, CVE-2013-5618, CVE-2013-6671, CVE-2013-5613)
A flaw was found in the way Thunderbird rendered web content with missing
character encoding information. An attacker could use this flaw to possibly
bypass same-origin inheritance and perform cross site-scripting (XSS)
attacks. (CVE-2013-5612)
It was found that certain malicious web content could bypass restrictions
applied by sandboxed iframes. An attacker could combine this flaw with
other vulnerabilities to execute arbitrary code with the privileges of the
user running Thunderbird. (CVE-2013-5614)
Note: All of the above issues cannot be exploited by a specially crafted
HTML mail message as JavaScript is disabled by default for mail messages.
They could be exploited another way in Thunderbird, for example, when
viewing the full remote content of an RSS feed.
Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Ben Turner, Bobby Holley, Jesse Ruderman, Christian
Holler, Masato Kinugawa, Daniel Veditz, Jesse Schwartzentruber, Nils, Tyson
Smith, and Atte Kettunen as the original reporters of these issues.
For technical details regarding these flaws, refer to the Mozilla security
advisories for Thunderbird 24.2.0 ESR. You can find a link to the Mozilla
advisories in the References section of this erratum.
All Thunderbird users should upgrade to this updated package, which
contains Thunderbird version 24.2.0 ESR, which corrects these issues.
After installing the update, Thunderbird must be restarted for the changes
to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated thunderbird package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the processing of malformed content.\nMalicious content could cause Thunderbird to crash or, potentially, execute\narbitrary code with the privileges of the user running Thunderbird.\n(CVE-2013-5609, CVE-2013-5616, CVE-2013-5618, CVE-2013-6671, CVE-2013-5613)\n\nA flaw was found in the way Thunderbird rendered web content with missing\ncharacter encoding information. An attacker could use this flaw to possibly\nbypass same-origin inheritance and perform cross site-scripting (XSS)\nattacks. (CVE-2013-5612)\n\nIt was found that certain malicious web content could bypass restrictions\napplied by sandboxed iframes. An attacker could combine this flaw with\nother vulnerabilities to execute arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2013-5614)\n\nNote: All of the above issues cannot be exploited by a specially crafted\nHTML mail message as JavaScript is disabled by default for mail messages.\nThey could be exploited another way in Thunderbird, for example, when\nviewing the full remote content of an RSS feed.\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Ben Turner, Bobby Holley, Jesse Ruderman, Christian\nHoller, Masato Kinugawa, Daniel Veditz, Jesse Schwartzentruber, Nils, Tyson\nSmith, and Atte Kettunen as the original reporters of these issues.\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Thunderbird 24.2.0 ESR. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nAll Thunderbird users should upgrade to this updated package, which\ncontains Thunderbird version 24.2.0 ESR, which corrects these issues.\nAfter installing the update, Thunderbird must be restarted for the changes\nto take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1823", "url": "https://access.redhat.com/errata/RHSA-2013:1823" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html", "url": "http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html" }, { "category": "external", "summary": "1039417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039417" }, { "category": "external", "summary": "1039420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039420" }, { "category": "external", "summary": "1039421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039421" }, { "category": "external", "summary": "1039422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039422" }, { "category": "external", "summary": "1039423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039423" }, { "category": "external", "summary": "1039426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039426" }, { "category": "external", "summary": "1039429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039429" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1823.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-25T11:56:16+00:00", "generator": { "date": "2024-11-25T11:56:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1823", "initial_release_date": "2013-12-11T17:22:00+00:00", "revision_history": [ { "date": "2013-12-11T17:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-12-11T17:26:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T11:56:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_productivity:5" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "product": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "product_id": "thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.2.0-1.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "thunderbird-0:24.2.0-1.el6_5.ppc64", "product": { "name": "thunderbird-0:24.2.0-1.el6_5.ppc64", "product_id": "thunderbird-0:24.2.0-1.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.2.0-1.el6_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "product": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "product_id": "thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.2.0-1.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-0:24.2.0-1.el6_5.x86_64", "product": { "name": "thunderbird-0:24.2.0-1.el6_5.x86_64", "product_id": "thunderbird-0:24.2.0-1.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.2.0-1.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "product": { "name": "thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "product_id": "thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.2.0-2.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-0:24.2.0-2.el5_10.x86_64", "product": { "name": "thunderbird-0:24.2.0-2.el5_10.x86_64", "product_id": "thunderbird-0:24.2.0-2.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.2.0-2.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "product": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "product_id": "thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.2.0-1.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "thunderbird-0:24.2.0-1.el6_5.s390x", "product": { "name": "thunderbird-0:24.2.0-1.el6_5.s390x", "product_id": "thunderbird-0:24.2.0-1.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.2.0-1.el6_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "product": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "product_id": "thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.2.0-1.el6_5?arch=i686" } } }, { "category": "product_version", "name": "thunderbird-0:24.2.0-1.el6_5.i686", "product": { "name": "thunderbird-0:24.2.0-1.el6_5.i686", "product_id": "thunderbird-0:24.2.0-1.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.2.0-1.el6_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:24.2.0-1.el6_5.src", "product": { "name": "thunderbird-0:24.2.0-1.el6_5.src", "product_id": "thunderbird-0:24.2.0-1.el6_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.2.0-1.el6_5?arch=src" } } }, { "category": "product_version", "name": "thunderbird-0:24.2.0-2.el5_10.src", "product": { "name": "thunderbird-0:24.2.0-2.el5_10.src", "product_id": "thunderbird-0:24.2.0-2.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.2.0-2.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "product": { "name": "thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "product_id": "thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.2.0-2.el5_10?arch=i386" } } }, { "category": "product_version", "name": "thunderbird-0:24.2.0-2.el5_10.i386", "product": { "name": "thunderbird-0:24.2.0-2.el5_10.i386", "product_id": "thunderbird-0:24.2.0-2.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.2.0-2.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-2.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386" }, "product_reference": "thunderbird-0:24.2.0-2.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-2.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src" }, "product_reference": "thunderbird-0:24.2.0-2.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-2.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64" }, "product_reference": "thunderbird-0:24.2.0-2.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-2.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-2.el5_10.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386" }, "product_reference": "thunderbird-0:24.2.0-2.el5_10.i386", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-2.el5_10.src as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src" }, "product_reference": "thunderbird-0:24.2.0-2.el5_10.src", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-2.el5_10.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64" }, "product_reference": "thunderbird-0:24.2.0-2.el5_10.x86_64", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-2.el5_10.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.src", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Atte Kettunen" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-0772", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2013-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "911840" } ], "notes": [ { "category": "description", "text": "The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Out-of-bounds read in image rendering (MFSA 2013-22)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue has been addressed in firefox 24.2.0-ESR and thunderbird 24.2.0-ESR via RHSA-2013:1812 and RHSA-2013:1823.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0772" }, { "category": "external", "summary": "RHBZ#911840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=911840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0772", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0772" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-22.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-22.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T17:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1823" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Out-of-bounds read in image rendering (MFSA 2013-22)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] } ], "cve": "CVE-2013-5609", "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039417" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Miscellaneous memory safety hazards (rv:24.2) (MFSA 2013-104)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5609" }, { "category": "external", "summary": "RHBZ#1039417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039417" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5609", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5609" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5609", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5609" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-104.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-104.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T17:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1823" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Miscellaneous memory safety hazards (rv:24.2) (MFSA 2013-104)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Masato Kinugawa" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-5612", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039420" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Character encoding cross-origin XSS attack (MFSA 2013-106)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5612" }, { "category": "external", "summary": "RHBZ#1039420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039420" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5612", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5612" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-106.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-106.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T17:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1823" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Character encoding cross-origin XSS attack (MFSA 2013-106)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] } ], "cve": "CVE-2013-5613", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039429" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5613" }, { "category": "external", "summary": "RHBZ#1039429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5613", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5613" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-114.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-114.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T17:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1823" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Daniel Veditz" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-5614", "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039421" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Sandbox restrictions not applied to nested object elements (MFSA 2013-107)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5614" }, { "category": "external", "summary": "RHBZ#1039421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039421" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5614", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5614" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-107.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-107.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T17:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1823" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Mozilla: Sandbox restrictions not applied to nested object elements (MFSA 2013-107)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Jesse Schwartzentruber" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-5616", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039422" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free in event listeners (MFSA 2013-108)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5616" }, { "category": "external", "summary": "RHBZ#1039422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039422" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5616", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5616" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-108.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-108.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T17:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1823" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Use-after-free in event listeners (MFSA 2013-108)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Nils" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-5618", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039423" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free during Table Editing (MFSA 2013-109)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5618" }, { "category": "external", "summary": "RHBZ#1039423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5618", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5618" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5618", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5618" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-109.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-109.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T17:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1823" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Use-after-free during Table Editing (MFSA 2013-109)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Tyson Smith" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6671", "discovery_date": "2013-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039426" } ], "notes": [ { "category": "description", "text": "The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Segmentation violation when replacing ordered list elements (MFSA 2013-111)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6671" }, { "category": "external", "summary": "RHBZ#1039426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039426" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6671", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6671" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html" } ], "release_date": "2013-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T17:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1823" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Segmentation violation when replacing ordered list elements (MFSA 2013-111)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Fabi\u00e1n Cuchietti", "Ateeq ur Rehman Khan" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6674", "discovery_date": "2014-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1063120" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Thunderbird 17.x through 17.0.8, Thunderbird ESR 17.x through 17.0.10, and SeaMonkey before 2.20 allows user-assisted remote attackers to inject arbitrary web script or HTML via an e-mail message containing a data: URL in an IFRAME element, a related issue to CVE-2014-2018.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Script execution in HTML mail replies (MFSA 2014-14)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was resolved in the version of thunderbird as shipped with Red Hat Enterprise Linux 5 and 6 via RHSA-2013:1823.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6674" }, { "category": "external", "summary": "RHBZ#1063120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6674", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6674" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-14.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-14.html" } ], "release_date": "2014-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-12-11T17:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1823" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.2.0-2.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.2.0-2.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.2.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.2.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Script execution in HTML mail replies (MFSA 2014-14)" } ] }
ghsa-cqvr-7f3r-7g8c
Vulnerability from github
Published
2022-05-13 01:23
Modified
2022-05-13 01:23
Severity ?
Details
The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
{ "affected": [], "aliases": [ "CVE-2013-6671" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-12-11T15:55:00Z", "severity": "CRITICAL" }, "details": "The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.", "id": "GHSA-cqvr-7f3r-7g8c", "modified": "2022-05-13T01:23:51Z", "published": "2022-05-13T01:23:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6671" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=930281" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201504-01" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1812.html" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/64212" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1029470" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1029476" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2053-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2013-6671
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-6671", "description": "The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.", "id": "GSD-2013-6671", "references": [ "https://www.suse.com/security/cve/CVE-2013-6671.html", "https://access.redhat.com/errata/RHSA-2013:1823", "https://access.redhat.com/errata/RHSA-2013:1812", "https://advisories.mageia.org/CVE-2013-6671.html", "https://linux.oracle.com/cve/CVE-2013-6671.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-6671" ], "details": "The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.", "id": "GSD-2013-6671", "modified": "2023-12-13T01:22:19.650322Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2013-6671", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:1958", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "name": "SUSE-SU-2013:1919", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" }, { "name": "openSUSE-SU-2013:1957", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "name": "FEDORA-2013-23127", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "name": "FEDORA-2013-23519", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "name": "1029470", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029470" }, { "name": "openSUSE-SU-2013:1917", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "name": "openSUSE-SU-2013:1959", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "name": "GLSA-201504-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201504-01" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "openSUSE-SU-2013:1916", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "name": "openSUSE-SU-2014:0008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "name": "1029476", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029476" }, { "name": "64212", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64212" }, { "name": "openSUSE-SU-2013:1918", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "name": "FEDORA-2013-23291", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "name": "USN-2052-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=930281", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=930281" }, { "name": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html" }, { "name": "RHSA-2013:1812", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1812.html" }, { "name": "USN-2053-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2053-1" }, { "name": "FEDORA-2013-23295", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "26.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "24.2", "versionStartIncluding": "24.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.23", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "24.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2013-6671" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-94" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=930281", "refsource": "CONFIRM", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=930281" }, { "name": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-111.html" }, { "name": "USN-2053-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2053-1" }, { "name": "USN-2052-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "name": "FEDORA-2013-23127", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "name": "openSUSE-SU-2013:1957", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "name": "openSUSE-SU-2013:1958", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "name": "openSUSE-SU-2013:1959", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "name": "64212", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64212" }, { "name": "openSUSE-SU-2014:0008", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "name": "RHSA-2013:1812", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1812.html" }, { "name": "openSUSE-SU-2013:1916", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "name": "SUSE-SU-2013:1919", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" }, { "name": "FEDORA-2013-23291", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "name": "FEDORA-2013-23295", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" }, { "name": "openSUSE-SU-2013:1918", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "name": "openSUSE-SU-2013:1917", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "name": "FEDORA-2013-23519", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "name": "1029470", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029470" }, { "name": "1029476", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029476" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "GLSA-201504-01", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201504-01" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2020-08-12T14:39Z", "publishedDate": "2013-12-11T15:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.