Vulnerability Description
Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 26.0 |
| Mozilla | Seamonkey | < 2.23 |
| Mozilla | Thunderbird | < 24.2 |
| Fedoraproject | Fedora | 18 |
| Suse | Suse Linux Enterprise Software Development Kit | 11.0 |
| Opensuse | Opensuse | 12.2 |
| Suse | Suse Linux Enterprise Desktop | 11 |
| Suse | Suse Linux Enterprise Server | 11 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 6.5 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Server Aus | 6.5 |
| Redhat | Enterprise Linux Server Eus | 6.5 |
| Redhat | Enterprise Linux Server Tus | 6.5 |
| Redhat | Enterprise Linux Workstation | 5.0 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.htMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2013-1812.htmlThird Party Advisory
- http://www.mozilla.org/security/announce/2013/mfsa2013-114.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
FAQ
What is CVE-2013-5613?
CVE-2013-5613 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows r...
How severe is CVE-2013-5613?
CVE-2013-5613 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2013-5613?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Fedoraproject Fedora, Suse Suse Linux Enterprise Software Development Kit.