Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
References
Configurations
History
21 Nov 2024, 01:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f - Mailing List, Patch | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0687.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0746.html - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:116 - Broken Link | |
References | () http://www.palemoon.org/releasenotes-ng.shtml - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=910149 - Exploit, Issue Tracking, Patch | |
References | () https://support.f5.com/csp/article/K51392553 - Third Party Advisory | |
References | () https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077 - Third Party Advisory |
15 Feb 2024, 21:08
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
CPE | cpe:2.3:a:palemoon:pale_moon:15.2.1:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:15.3:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:5.0:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:15.3.1:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:12.0:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:15.1.1:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:12.2:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:15.1:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:15.0:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:11.0.1:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:7.0:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:6.0:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:4.0.3:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:11.0:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:15.2:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:9.0.1:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:4.0:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:4.0.6:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:9.1:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:9.0:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:12.1:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:4.0.7:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:12.3:r2:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:9.2:*:*:*:*:*:*:* cpe:2.3:a:palemoon:pale_moon:12.3:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:116 - Broken Link | |
References | (MISC) http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f - Mailing List, Patch | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-0746.html - Third Party Advisory | |
References | (CONFIRM) https://support.f5.com/csp/article/K51392553 - Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=910149 - Exploit, Issue Tracking, Patch | |
References | (CONFIRM) https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-0687.html - Third Party Advisory | |
References | (CONFIRM) http://www.palemoon.org/releasenotes-ng.shtml - Broken Link |
Information
Published : 2013-01-31 23:55
Updated : 2024-11-21 01:49
NVD link : CVE-2013-1591
Mitre link : CVE-2013-1591
CVE.ORG link : CVE-2013-1591
JSON object : View
Products Affected
palemoon
- pale_moon
redhat
- enterprise_linux
- enterprise_virtualization
CWE
CWE-190
Integer Overflow or Wraparound