The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-1210.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-1211.html - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2553 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2554 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2556 - Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2012/mfsa2012-65.html - Vendor Advisory | |
References | () http://www.ubuntu.com/usn/USN-1548-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1548-2 - Third Party Advisory | |
References | () http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=746855 - Issue Tracking, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16234 - Third Party Advisory |
21 Oct 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE |
Information
Published : 2012-08-29 10:56
Updated : 2024-11-21 01:41
NVD link : CVE-2012-3972
Mitre link : CVE-2012-3972
CVE.ORG link : CVE-2012-3972
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
- seamonkey
- thunderbird_esr
opensuse
- opensuse
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux_workstation
suse
- linux_enterprise_software_development_kit
- linux_enterprise_server
- linux_enterprise_desktop
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor