Vulnerability Description
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 22.0 |
| Mozilla | Thunderbird | < 17.0.7 |
| Mozilla | Thunderbird Esr | >= 17.0, < 17.0.7 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
| Redhat | Gluster Storage Server For On-Premise | 2.0 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 5.9 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Server Aus | 5.9 |
| Redhat | Enterprise Linux Workstation | 5.0 |
| Opensuse | Opensuse | 11.4 |
| Suse | Linux Enterprise Desktop | 10 |
| Suse | Linux Enterprise Server | 10 |
| Suse | Linux Enterprise Software Development Kit | 10 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2013-0981.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2013-0982.htmlThird Party Advisory
- http://www.debian.org/security/2013/dsa-2716Mailing ListThird Party Advisory
- http://www.debian.org/security/2013/dsa-2720Mailing ListThird Party Advisory
- http://www.mozilla.org/security/announce/2013/mfsa2013-53.htmlVendor Advisory
- http://www.securityfocus.com/bid/60778Broken LinkThird Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-1890-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-1891-1Third Party Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=857883Issue Tracking
FAQ
What is CVE-2013-1690?
CVE-2013-1690 is a vulnerability with a CVSS score of 8.8 (HIGH). Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page...
How severe is CVE-2013-1690?
CVE-2013-1690 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1690?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Thunderbird, Mozilla Thunderbird Esr, Canonical Ubuntu Linux, Debian Debian Linux.