CRITICAL · 9.8

CVE-2013-5615

The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on...

Vulnerability Description

The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
MozillaFirefox< 26.0
MozillaSeamonkey< 2.23
MozillaThunderbird< 24.2
CanonicalUbuntu Linux12.04
SuseSuse Linux Enterprise Software Development Kit11.0
OpensuseOpensuse12.2
SuseSuse Linux Enterprise Desktop11
SuseSuse Linux Enterprise Server11
FedoraprojectFedora18

References

FAQ

What is CVE-2013-5615?

CVE-2013-5615 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on...

How severe is CVE-2013-5615?

CVE-2013-5615 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2013-5615?

Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Canonical Ubuntu Linux, Suse Suse Linux Enterprise Software Development Kit.