CVE-2013-5613Use After Free in Mozilla Firefox

CWE-416Use After Free7 documents6 sources
Severity
9.8CRITICALNVD
EPSS
11.1%
top 6.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 11
Latest updateMay 13

Description

Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages10 packages

NVDmozilla/firefox24.024.2+1
NVDmozilla/seamonkey< 2.23
NVDopensuse/opensuse12.2, 12.3, 13.1+2

Also affects: Fedora 18, 19, 20, Ubuntu Linux 12.04, 12.10, 13.04, 13.10, Enterprise Linux 6.5

🔴Vulnerability Details

2
GHSA
GHSA-28w2-h994-g9jp: Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 262022-05-13
CVEList
CVE-2013-5613: Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 262013-12-11

📋Vendor Advisories

3
Ubuntu
Thunderbird vulnerabilities2013-12-11
Ubuntu
Firefox vulnerabilities2013-12-11
Red Hat
Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114)2013-12-10

💬Community

1
Bugzilla
CVE-2013-5613 Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114)2013-12-09
CVE-2013-5613 — Use After Free in Mozilla Firefox | cvebase