Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html - Mailing List, Third Party Advisory | |
References | () http://osvdb.org/87608 - Broken Link | |
References | () http://rhn.redhat.com/errata/RHSA-2012-1482.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-1483.html - Third Party Advisory | |
References | () http://secunia.com/advisories/51359 - Third Party Advisory | |
References | () http://secunia.com/advisories/51360 - Third Party Advisory | |
References | () http://secunia.com/advisories/51369 - Third Party Advisory | |
References | () http://secunia.com/advisories/51370 - Third Party Advisory | |
References | () http://secunia.com/advisories/51381 - Third Party Advisory | |
References | () http://secunia.com/advisories/51434 - Third Party Advisory | |
References | () http://secunia.com/advisories/51439 - Third Party Advisory | |
References | () http://secunia.com/advisories/51440 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2583 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2584 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2588 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:173 - Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2012/mfsa2012-105.html - Not Applicable | |
References | () http://www.mozilla.org/security/announce/2013/mfsa2013-02.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/56636 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1636-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1638-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1638-2 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1638-3 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1681-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1681-2 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1681-4 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=792305 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/80195 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16849 - Third Party Advisory |
21 Oct 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE |
Information
Published : 2012-11-21 12:55
Updated : 2024-11-21 01:45
NVD link : CVE-2012-5829
Mitre link : CVE-2012-5829
CVE.ORG link : CVE-2012-5829
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_workstation
- enterprise_linux_eus
mozilla
- thunderbird
- firefox
- seamonkey
- thunderbird_esr
suse
- linux_enterprise_desktop
- linux_enterprise_server
- linux_enterprise_software_development_kit
canonical
- ubuntu_linux
debian
- debian_linux
opensuse
- opensuse
CWE
CWE-787
Out-of-bounds Write