HIGH · 10.0

CVE-2012-3957

Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and ...

Vulnerability Description

Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.

CVSS Score

10.0

HIGH

AV:N/AC:L/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
MozillaFirefox< 15.0
MozillaSeamonkey< 2.12
MozillaThunderbird< 15.0
MozillaThunderbird Esr>= 10.0, < 10.0.7
OpensuseOpensuse12.2
SuseLinux Enterprise Desktop10
SuseLinux Enterprise Server10
SuseLinux Enterprise Software Development Kit11
RedhatEnterprise Linux Desktop5.0
RedhatEnterprise Linux Eus6.3
RedhatEnterprise Linux Server5.0
RedhatEnterprise Linux Server Eus6.3
RedhatEnterprise Linux Workstation5.0
CanonicalUbuntu Linux10.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-3957?

CVE-2012-3957 is a vulnerability with a CVSS score of 10.0 (HIGH). Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and ...

How severe is CVE-2012-3957?

CVE-2012-3957 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-3957?

Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Mozilla Thunderbird Esr, Opensuse Opensuse.