Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1476.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1480.html - | |
References | () http://www.debian.org/security/2013/dsa-2788 - | |
References | () http://www.debian.org/security/2013/dsa-2797 - | |
References | () http://www.mozilla.org/security/announce/2013/mfsa2013-98.html - Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=918864 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19277 - | |
References | () https://security.gentoo.org/glsa/201504-01 - |
21 Oct 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:* |
21 Oct 2024, 13:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:* |
Information
Published : 2013-10-30 10:55
Updated : 2024-11-21 01:57
NVD link : CVE-2013-5597
Mitre link : CVE-2013-5597
CVE.ORG link : CVE-2013-5597
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
- seamonkey
- thunderbird_esr
- firefox_esr
CWE