Vulnerability Description
Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 26.0 |
| Mozilla | Seamonkey | < 2.23 |
| Mozilla | Thunderbird | < 24.2 |
| Fedoraproject | Fedora | 18 |
| Suse | Suse Linux Enterprise Software Development Kit | 11.0 |
| Opensuse | Opensuse | 12.2 |
| Suse | Suse Linux Enterprise Desktop | 11 |
| Suse | Suse Linux Enterprise Server | 11 |
| Canonical | Ubuntu Linux | 12.04 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 6.5 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Server Aus | 6.5 |
| Redhat | Enterprise Linux Server Eus | 6.5 |
| Redhat | Enterprise Linux Server Tus | 6.5 |
| Redhat | Enterprise Linux Workstation | 5.0 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.hMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.htMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2013-1812.htmlThird Party Advisory
- http://www.mozilla.org/security/announce/2013/mfsa2013-109.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
FAQ
What is CVE-2013-5618?
CVE-2013-5618 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderb...
How severe is CVE-2013-5618?
CVE-2013-5618 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2013-5618?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Fedoraproject Fedora, Suse Suse Linux Enterprise Software Development Kit.