Vulnerability CVE-2013-5604


Published: 2013-10-30

Description:
The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Mozilla -> Thunderbird esr 
Mozilla -> Seamonkey 
Mozilla -> Firefox esr 
Mozilla -> Thunderbird 
Mozilla -> Firefox 

 References:
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html
http://rhn.redhat.com/errata/RHSA-2013-1476.html
http://rhn.redhat.com/errata/RHSA-2013-1480.html
http://www.debian.org/security/2013/dsa-2788
http://www.debian.org/security/2013/dsa-2797
http://www.mozilla.org/security/announce/2013/mfsa2013-95.html
https://bugzilla.mozilla.org/show_bug.cgi?id=914017
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19091
https://security.gentoo.org/glsa/201504-01

Copyright 2024, cxsecurity.com

 

Back to Top