First published: Wed Mar 14 2012(Updated: )
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =4.0 | |
Firefox | =4.0-beta1 | |
Firefox | =4.0-beta10 | |
Firefox | =4.0-beta11 | |
Firefox | =4.0-beta12 | |
Firefox | =4.0-beta2 | |
Firefox | =4.0-beta3 | |
Firefox | =4.0-beta4 | |
Firefox | =4.0-beta5 | |
Firefox | =4.0-beta6 | |
Firefox | =4.0-beta7 | |
Firefox | =4.0-beta8 | |
Firefox | =4.0-beta9 | |
Firefox | =4.0.1 | |
Firefox | =5.0 | |
Firefox | =5.0.1 | |
Firefox | =6.0 | |
Firefox | =6.0.1 | |
Firefox | =6.0.2 | |
Firefox | =7.0 | |
Firefox | =7.0.1 | |
Firefox | =8.0 | |
Firefox | =8.0.1 | |
Firefox | =9.0 | |
Firefox | =9.0.1 | |
Firefox | =10.0 | |
Firefox ESR | =10.1 | |
Firefox ESR | =10.2 | |
Thunderbird | =5.0 | |
Thunderbird | =6.0 | |
Thunderbird | =6.0.1 | |
Thunderbird | =6.0.2 | |
Thunderbird | =7.0 | |
Thunderbird | =7.0.1 | |
Thunderbird | =8.0 | |
Thunderbird | =9.0 | |
Thunderbird | =9.0.1 | |
Mozilla Thunderbird | =10.0 | |
Mozilla Thunderbird | =10.0.1 | |
Mozilla Thunderbird | =10.0.2 | |
Mozilla SeaMonkey | <=2.7 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0-alpha | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.7 | |
Mozilla SeaMonkey | =1.0.8 | |
Mozilla SeaMonkey | =1.0.9 | |
Mozilla SeaMonkey | =1.1 | |
Mozilla SeaMonkey | =1.1-alpha | |
Mozilla SeaMonkey | =1.1-beta | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =1.1.4 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.1.6 | |
Mozilla SeaMonkey | =1.1.7 | |
Mozilla SeaMonkey | =1.1.8 | |
Mozilla SeaMonkey | =1.1.9 | |
Mozilla SeaMonkey | =1.1.10 | |
Mozilla SeaMonkey | =1.1.11 | |
Mozilla SeaMonkey | =1.1.12 | |
Mozilla SeaMonkey | =1.1.13 | |
Mozilla SeaMonkey | =1.1.14 | |
Mozilla SeaMonkey | =1.1.15 | |
Mozilla SeaMonkey | =1.1.16 | |
Mozilla SeaMonkey | =1.1.17 | |
Mozilla SeaMonkey | =1.1.18 | |
Mozilla SeaMonkey | =1.1.19 | |
Mozilla SeaMonkey | =1.5.0.8 | |
Mozilla SeaMonkey | =1.5.0.9 | |
Mozilla SeaMonkey | =1.5.0.10 | |
Mozilla SeaMonkey | =2.0 | |
Mozilla SeaMonkey | =2.0-alpha_1 | |
Mozilla SeaMonkey | =2.0-alpha_2 | |
Mozilla SeaMonkey | =2.0-alpha_3 | |
Mozilla SeaMonkey | =2.0-beta_1 | |
Mozilla SeaMonkey | =2.0-beta_2 | |
Mozilla SeaMonkey | =2.0-rc1 | |
Mozilla SeaMonkey | =2.0-rc2 | |
Mozilla SeaMonkey | =2.0.1 | |
Mozilla SeaMonkey | =2.0.2 | |
Mozilla SeaMonkey | =2.0.3 | |
Mozilla SeaMonkey | =2.0.4 | |
Mozilla SeaMonkey | =2.0.5 | |
Mozilla SeaMonkey | =2.0.6 | |
Mozilla SeaMonkey | =2.0.7 | |
Mozilla SeaMonkey | =2.0.8 | |
Mozilla SeaMonkey | =2.0.9 | |
Mozilla SeaMonkey | =2.0.10 | |
Mozilla SeaMonkey | =2.0.11 | |
Mozilla SeaMonkey | =2.0.12 | |
Mozilla SeaMonkey | =2.0.13 | |
Mozilla SeaMonkey | =2.0.14 | |
Mozilla SeaMonkey | =2.1 | |
Mozilla SeaMonkey | =2.1-alpha1 | |
Mozilla SeaMonkey | =2.1-alpha2 | |
Mozilla SeaMonkey | =2.1-alpha3 | |
Mozilla SeaMonkey | =2.1-beta1 | |
Mozilla SeaMonkey | =2.1-beta2 | |
Mozilla SeaMonkey | =2.1-beta3 | |
Mozilla SeaMonkey | =2.1-rc1 | |
Mozilla SeaMonkey | =2.1-rc2 | |
Mozilla SeaMonkey | =2.2 | |
Mozilla SeaMonkey | =2.2-beta1 | |
Mozilla SeaMonkey | =2.2-beta2 | |
Mozilla SeaMonkey | =2.2-beta3 | |
Mozilla SeaMonkey | =2.3 | |
Mozilla SeaMonkey | =2.3-beta1 | |
Mozilla SeaMonkey | =2.3-beta2 | |
Mozilla SeaMonkey | =2.3-beta3 | |
Mozilla SeaMonkey | =2.3.1 | |
Mozilla SeaMonkey | =2.3.2 | |
Mozilla SeaMonkey | =2.3.3 | |
Mozilla SeaMonkey | =2.4 | |
Mozilla SeaMonkey | =2.4-beta1 | |
Mozilla SeaMonkey | =2.4-beta2 | |
Mozilla SeaMonkey | =2.4-beta3 | |
Mozilla SeaMonkey | =2.4.1 | |
Mozilla SeaMonkey | =2.5 | |
Mozilla SeaMonkey | =2.5-beta1 | |
Mozilla SeaMonkey | =2.5-beta2 | |
Mozilla SeaMonkey | =2.5-beta3 | |
Mozilla SeaMonkey | =2.5-beta4 | |
Mozilla SeaMonkey | =2.6 | |
Mozilla SeaMonkey | =2.6-beta1 | |
Mozilla SeaMonkey | =2.6-beta2 | |
Mozilla SeaMonkey | =2.6-beta3 | |
Mozilla SeaMonkey | =2.6-beta4 | |
Mozilla SeaMonkey | =2.6.1 | |
Mozilla SeaMonkey | =2.7-beta1 | |
Mozilla SeaMonkey | =2.7-beta2 | |
Mozilla SeaMonkey | =2.7-beta3 | |
Mozilla SeaMonkey | =2.7-beta4 | |
Firefox ESR | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0462 is classified as a high-severity vulnerability as it allows for remote denial of service due to memory corruption.
To mitigate CVE-2012-0462, users should update their Mozilla Firefox, Thunderbird, or SeaMonkey applications to the latest version.
CVE-2012-0462 affects Mozilla Firefox versions from 4.x through 10.0, Thunderbird versions 5.0 through 10.0, and SeaMonkey versions prior to 2.8.
The impact of CVE-2012-0462 is primarily the potential for remote attackers to cause a denial of service.
Yes, CVE-2012-0462 can be exploited remotely, allowing attackers to manipulate vulnerable software.