Severity
10.0CRITICALNVD
EPSS
1.9%
top 16.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13
Latest updateMay 13

Description

The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages11 packages

NVDmozilla/firefox10.010.0.12+2
NVDmozilla/thunderbird< 17.0.2
NVDmozilla/thunderbird_esr10.010.0.12+1
NVDmozilla/seamonkey< 2.15
NVDopensuse/opensuse11.4, 12.1, 12.2+2

Also affects: Ubuntu Linux 10.04, 11.10, 12.04, 12.10, Enterprise Linux 5.9, 6.3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q6xj-ccv4-mg5m: The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 182022-05-13
CVEList
CVE-2013-0767: The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 182013-01-13

📋Vendor Advisories

3
Ubuntu
Firefox vulnerabilities2013-01-09
Ubuntu
Thunderbird vulnerabilities2013-01-09
Red Hat
Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02)2013-01-08

💬Community

1
Bugzilla
CVE-2013-0762 CVE-2013-0766 CVE-2013-0767 Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02)2013-01-04
CVE-2013-0767 — Out-of-bounds Read in Mozilla Firefox | cvebase