HIGH · 9.3

CVE-2012-3967

The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large n...

Vulnerability Description

The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.

CVSS Score

9.3

HIGH

AV:N/AC:M/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
MozillaFirefox< 15.0
MozillaSeamonkey< 2.12
MozillaThunderbird< 15.0
MozillaThunderbird Esr>= 10.0, < 10.0.7
LinuxLinux KernelAll versions
OpensuseOpensuse12.2
SuseLinux Enterprise Desktop10
SuseLinux Enterprise Server10
SuseLinux Enterprise Software Development Kit10
RedhatEnterprise Linux Desktop5.0
RedhatEnterprise Linux Eus6.3
RedhatEnterprise Linux Server5.0
RedhatEnterprise Linux Workstation5.0
CanonicalUbuntu Linux10.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-3967?

CVE-2012-3967 is a vulnerability with a CVSS score of 9.3 (HIGH). The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large n...

How severe is CVE-2012-3967?

CVE-2012-3967 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-3967?

Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Mozilla Thunderbird Esr, Linux Linux Kernel.