CVE-2013-0750Integer Overflow or Wraparound in Mozilla Firefox

Severity
9.3CRITICALNVD
EPSS
3.8%
top 11.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13
Latest updateMay 13

Description

Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages11 packages

NVDmozilla/firefox10.010.0.12+2
NVDmozilla/thunderbird< 17.0.2
NVDmozilla/thunderbird_esr10.010.0.12+1
NVDmozilla/seamonkey< 2.15
NVDopensuse/opensuse11.4, 12.1, 12.2+2

Also affects: Ubuntu Linux 10.04, 11.10, 12.04, 12.10, Enterprise Linux 5.9, 6.3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-f77x-4q67-r7px: Integer overflow in the JavaScript implementation in Mozilla Firefox before 182022-05-13
CVEList
CVE-2013-0750: Integer overflow in the JavaScript implementation in Mozilla Firefox before 182013-01-13

📋Vendor Advisories

3
Ubuntu
Firefox vulnerabilities2013-01-09
Ubuntu
Thunderbird vulnerabilities2013-01-09
Red Hat
Mozilla: Buffer overflow in Javascript string concatenation (MFSA 2013-12)2013-01-08

💬Community

1
Bugzilla
CVE-2013-0750 Mozilla: Buffer overflow in Javascript string concatenation (MFSA 2013-12)2013-01-05
CVE-2013-0750 — Integer Overflow or Wraparound | cvebase