The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/63421 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18694 | vdb entry signature |
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html | vendor advisory |
http://www.mozilla.org/security/announce/2013/mfsa2013-96.html | vendor advisory |
https://security.gentoo.org/glsa/201504-01 | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=916580 | |
http://rhn.redhat.com/errata/RHSA-2013-1480.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2013-1476.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html | vendor advisory |
http://www.debian.org/security/2013/dsa-2788 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html | vendor advisory |
http://www.debian.org/security/2013/dsa-2797 | vendor advisory |