Vulnerability Description
The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 26.0 |
| Mozilla | Seamonkey | < 2.23 |
| Mozilla | Thunderbird | < 24.2 |
| Canonical | Ubuntu Linux | 12.04 |
| Suse | Suse Linux Enterprise Software Development Kit | 11.0 |
| Opensuse | Opensuse | 12.2 |
| Suse | Suse Linux Enterprise Desktop | 11 |
| Suse | Suse Linux Enterprise Server | 11 |
| Fedoraproject | Fedora | 18 |
References
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.htMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.htmlMailing ListThird Party Advisory
- http://www.mozilla.org/security/announce/2013/mfsa2013-115.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
- http://www.securitytracker.com/id/1029470Third Party AdvisoryVDB Entry
FAQ
What is CVE-2013-5615?
CVE-2013-5615 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on...
How severe is CVE-2013-5615?
CVE-2013-5615 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2013-5615?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Canonical Ubuntu Linux, Suse Suse Linux Enterprise Software Development Kit.