CVE-2012-0452

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding.

References

http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00012.html

http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00013.html

http://secunia.com/advisories/48110

http://secunia.com/advisories/49055

http://www.mandriva.com/security/advisories?name=MDVSA-2012:017

http://www.mandriva.com/security/advisories?name=MDVSA-2012:018

http://www.mozilla.org/security/announce/2012/mfsa2012-10.html

http://www.securityfocus.com/bid/51975

http://www.ubuntu.com/usn/USN-1360-1

https://bugzilla.mozilla.org/show_bug.cgi?id=724284

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15017

Details

Source: MITRE

Published: 2012-02-11

Updated: 2018-01-10

Type: CWE-399

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (23 total)

IDNameProductFamilySeverity
76027openSUSE Security Update : seamonkey (seamonkey-5804)NessusSuSE Local Security Checks
high
75952openSUSE Security Update : MozillaFirefox (MozillaFirefox-5799)NessusSuSE Local Security Checks
high
74857openSUSE Security Update : MozillaFirefox / MozillaThunderbird / seamonkey / etc (openSUSE-2012-92)NessusSuSE Local Security Checks
high
74612openSUSE Security Update : MozillaFirefox / MozillaThunderbird / seamonkey / etc (openSUSE-SU-2012:0567-1)NessusSuSE Local Security Checks
critical
63402GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)NessusGentoo Local Security Checks
critical
61944Mandriva Linux Security Advisory : mozilla-thunderbird (MDVSA-2012:018)NessusMandriva Local Security Checks
high
58071Thunderbird 10.x < 10.0.1 Memory Corruption (Mac OS X)NessusMacOS X Local Security Checks
high
58070Firefox < 10.0.1 Memory Corruption (Mac OS X)NessusMacOS X Local Security Checks
high
801298Mozilla Firefox 10.x < 10.0.1 Memory CorruptionLog Correlation EngineWeb Clients
high
6324Mozilla Firefox 10.x < 10.0.1 Memory CorruptionNessus Network MonitorWeb Clients
high
58037Ubuntu 11.10 : thunderbird vulnerabilities (USN-1369-1)NessusUbuntu Local Security Checks
critical
57971SuSE 11.1 Security Update : Mozilla Firefox (SAT Patch Number 5807)NessusSuSE Local Security Checks
high
57970SuSE 11.1 Security Update : Mozilla Firefox (SAT Patch Number 5807)NessusSuSE Local Security Checks
high
57934Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : firefox vulnerability (USN-1360-1)NessusUbuntu Local Security Checks
high
57921SeaMonkey < 2.7.1 Memory CorruptionNessusWindows
high
57920Mozilla Thunderbird 10.x < 10.0.1 Memory CorruptionNessusWindows
high
57919Firefox 10.x < 10.0.1 Memory CorruptionNessusWindows
high
57912Mandriva Linux Security Advisory : firefox (MDVSA-2012:017)NessusMandriva Local Security Checks
high
57911FreeBSD : mozilla -- use-after-free in nsXBLDocumentInfo::ReadPrototypeBindings (eba9aa94-549c-11e1-b6b7-0011856a6e37)NessusFreeBSD Local Security Checks
high
801319Mozilla Thunderbird 10.x < 10.0.1 Memory CorruptionLog Correlation EngineWeb Clients
high
801232Mozilla SeaMonkey 2.x < 2.7.1 Memory CorruptionLog Correlation EngineWeb Clients
high
6328SeaMonkey 2.x < 2.7.1 Memory CorruptionNessus Network MonitorWeb Clients
high
6326Mozilla Thunderbird 10.x < 10.0.1 Memory CorruptionNessus Network MonitorSMTP Clients
high