First published: Tue Jun 05 2012(Updated: )
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp, and unknown other components.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <13.0 | |
Mozilla SeaMonkey | <2.10 | |
Mozilla Thunderbird | <13.0 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp4 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp1 | |
suse linux enterprise server vmware | =11-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp1 | |
Red Hat Storage | =2.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =6.2 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =6.2 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1938 has a high severity rating due to potential remote code execution and denial of service risks.
To mitigate CVE-2012-1938, update affected Mozilla applications to versions 13.0 or later.
CVE-2012-1938 affects Mozilla Firefox before version 13.0, Thunderbird before version 13.0, and SeaMonkey before version 2.10.
CVE-2012-1938 is characterized as a memory corruption vulnerability that can lead to application crashes.
The potential impacts of CVE-2012-1938 include application crashes and remote code execution by an attacker.