CVE-2013-5615

HIGH

Description

The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.

References

http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html

http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html

http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html

http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html

http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html

http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html

http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html

http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html

http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html

http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html

http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html

http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html

http://www.mozilla.org/security/announce/2013/mfsa2013-115.html

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.securitytracker.com/id/1029470

http://www.securitytracker.com/id/1029476

http://www.ubuntu.com/usn/USN-2052-1

http://www.ubuntu.com/usn/USN-2053-1

https://bugzilla.mozilla.org/show_bug.cgi?id=929261

https://security.gentoo.org/glsa/201504-01

Details

Source: MITRE

Published: 2013-12-11

Updated: 2016-12-22

Type: CWE-264

Risk Information

CVSS v2.0

Base Score: 10

Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Impact Score: 10

Exploitability Score: 10

Severity: HIGH