CVE-2013-0791

The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.
References
Link Resource
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html Broken Link
http://rhn.redhat.com/errata/RHSA-2013-1135.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1144.html Third Party Advisory
http://www.mozilla.org/security/announce/2013/mfsa2013-40.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Third Party Advisory
http://www.securityfocus.com/bid/58826 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1791-1 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=629816 Issue Tracking Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17150 Broken Link
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html Broken Link
http://rhn.redhat.com/errata/RHSA-2013-1135.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1144.html Third Party Advisory
http://www.mozilla.org/security/announce/2013/mfsa2013-40.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Third Party Advisory
http://www.securityfocus.com/bid/58826 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1791-1 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=629816 Issue Tracking Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17150 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:48

Type Values Removed Values Added
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 - Third Party Advisory () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html - Broken Link
References () http://rhn.redhat.com/errata/RHSA-2013-1135.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-1135.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-1144.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-1144.html - Third Party Advisory
References () http://www.mozilla.org/security/announce/2013/mfsa2013-40.html - Vendor Advisory () http://www.mozilla.org/security/announce/2013/mfsa2013-40.html - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory
References () http://www.securityfocus.com/bid/58826 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/58826 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-1791-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1791-1 - Third Party Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=629816 - Issue Tracking, Patch, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=629816 - Issue Tracking, Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17150 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17150 - Broken Link

21 Oct 2024, 13:55

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*

Information

Published : 2013-04-03 11:56

Updated : 2024-11-21 01:48


NVD link : CVE-2013-0791

Mitre link : CVE-2013-0791

CVE.ORG link : CVE-2013-0791


JSON object : View

Products Affected

oracle

  • vm_server

mozilla

  • firefox
  • thunderbird
  • network_security_services
  • seamonkey
  • thunderbird_esr

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_workstation

canonical

  • ubuntu_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer