First published: Tue Jun 05 2012(Updated: )
Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =4.0 | |
Firefox | =4.0-beta1 | |
Firefox | =4.0-beta10 | |
Firefox | =4.0-beta11 | |
Firefox | =4.0-beta12 | |
Firefox | =4.0-beta2 | |
Firefox | =4.0-beta3 | |
Firefox | =4.0-beta4 | |
Firefox | =4.0-beta5 | |
Firefox | =4.0-beta6 | |
Firefox | =4.0-beta7 | |
Firefox | =4.0-beta8 | |
Firefox | =4.0-beta9 | |
Firefox | =4.0.1 | |
Firefox | =5.0 | |
Firefox | =5.0.1 | |
Firefox | =6.0 | |
Firefox | =6.0.1 | |
Firefox | =6.0.2 | |
Firefox | =7.0 | |
Firefox | =7.0.1 | |
Firefox | =8.0 | |
Firefox | =8.0.1 | |
Firefox | =9.0 | |
Firefox | =9.0.1 | |
Firefox | =10.0 | |
Firefox | =10.0.1 | |
Firefox | =10.0.2 | |
Firefox | =10.0.3 | |
Firefox | =10.0.4 | |
Firefox | =11.0 | |
Firefox | =12.0 | |
Firefox | =12.0-beta6 | |
Mozilla SeaMonkey | <=2.9 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0-alpha | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.7 | |
Mozilla SeaMonkey | =1.0.8 | |
Mozilla SeaMonkey | =1.0.9 | |
Mozilla SeaMonkey | =1.1 | |
Mozilla SeaMonkey | =1.1-alpha | |
Mozilla SeaMonkey | =1.1-beta | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =1.1.4 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.1.6 | |
Mozilla SeaMonkey | =1.1.7 | |
Mozilla SeaMonkey | =1.1.8 | |
Mozilla SeaMonkey | =1.1.9 | |
Mozilla SeaMonkey | =1.1.10 | |
Mozilla SeaMonkey | =1.1.11 | |
Mozilla SeaMonkey | =1.1.12 | |
Mozilla SeaMonkey | =1.1.13 | |
Mozilla SeaMonkey | =1.1.14 | |
Mozilla SeaMonkey | =1.1.15 | |
Mozilla SeaMonkey | =1.1.16 | |
Mozilla SeaMonkey | =1.1.17 | |
Mozilla SeaMonkey | =1.1.18 | |
Mozilla SeaMonkey | =1.1.19 | |
Mozilla SeaMonkey | =1.5.0.8 | |
Mozilla SeaMonkey | =1.5.0.9 | |
Mozilla SeaMonkey | =1.5.0.10 | |
Mozilla SeaMonkey | =2.0 | |
Mozilla SeaMonkey | =2.0-alpha_1 | |
Mozilla SeaMonkey | =2.0-alpha_2 | |
Mozilla SeaMonkey | =2.0-alpha_3 | |
Mozilla SeaMonkey | =2.0-beta_1 | |
Mozilla SeaMonkey | =2.0-beta_2 | |
Mozilla SeaMonkey | =2.0-rc1 | |
Mozilla SeaMonkey | =2.0-rc2 | |
Mozilla SeaMonkey | =2.0.1 | |
Mozilla SeaMonkey | =2.0.2 | |
Mozilla SeaMonkey | =2.0.3 | |
Mozilla SeaMonkey | =2.0.4 | |
Mozilla SeaMonkey | =2.0.5 | |
Mozilla SeaMonkey | =2.0.6 | |
Mozilla SeaMonkey | =2.0.7 | |
Mozilla SeaMonkey | =2.0.8 | |
Mozilla SeaMonkey | =2.0.9 | |
Mozilla SeaMonkey | =2.0.10 | |
Mozilla SeaMonkey | =2.0.11 | |
Mozilla SeaMonkey | =2.0.12 | |
Mozilla SeaMonkey | =2.0.13 | |
Mozilla SeaMonkey | =2.0.14 | |
Mozilla SeaMonkey | =2.1 | |
Mozilla SeaMonkey | =2.1-alpha1 | |
Mozilla SeaMonkey | =2.1-alpha2 | |
Mozilla SeaMonkey | =2.1-alpha3 | |
Mozilla SeaMonkey | =2.1-beta1 | |
Mozilla SeaMonkey | =2.1-beta2 | |
Mozilla SeaMonkey | =2.1-beta3 | |
Mozilla SeaMonkey | =2.1-rc1 | |
Mozilla SeaMonkey | =2.1-rc2 | |
Mozilla SeaMonkey | =2.2 | |
Mozilla SeaMonkey | =2.2-beta1 | |
Mozilla SeaMonkey | =2.2-beta2 | |
Mozilla SeaMonkey | =2.2-beta3 | |
Mozilla SeaMonkey | =2.3 | |
Mozilla SeaMonkey | =2.3-beta1 | |
Mozilla SeaMonkey | =2.3-beta2 | |
Mozilla SeaMonkey | =2.3-beta3 | |
Mozilla SeaMonkey | =2.3.1 | |
Mozilla SeaMonkey | =2.3.2 | |
Mozilla SeaMonkey | =2.3.3 | |
Mozilla SeaMonkey | =2.4 | |
Mozilla SeaMonkey | =2.4-beta1 | |
Mozilla SeaMonkey | =2.4-beta2 | |
Mozilla SeaMonkey | =2.4-beta3 | |
Mozilla SeaMonkey | =2.4.1 | |
Mozilla SeaMonkey | =2.5 | |
Mozilla SeaMonkey | =2.5-beta1 | |
Mozilla SeaMonkey | =2.5-beta2 | |
Mozilla SeaMonkey | =2.5-beta3 | |
Mozilla SeaMonkey | =2.5-beta4 | |
Mozilla SeaMonkey | =2.6 | |
Mozilla SeaMonkey | =2.6-beta1 | |
Mozilla SeaMonkey | =2.6-beta2 | |
Mozilla SeaMonkey | =2.6-beta3 | |
Mozilla SeaMonkey | =2.6-beta4 | |
Mozilla SeaMonkey | =2.6.1 | |
Mozilla SeaMonkey | =2.7 | |
Mozilla SeaMonkey | =2.7-beta1 | |
Mozilla SeaMonkey | =2.7-beta2 | |
Mozilla SeaMonkey | =2.7-beta3 | |
Mozilla SeaMonkey | =2.7-beta4 | |
Mozilla SeaMonkey | =2.7-beta5 | |
Mozilla SeaMonkey | =2.7.1 | |
Mozilla SeaMonkey | =2.7.2 | |
Mozilla SeaMonkey | =2.8 | |
Mozilla SeaMonkey | =2.8-beta1 | |
Mozilla SeaMonkey | =2.8-beta2 | |
Mozilla SeaMonkey | =2.8-beta3 | |
Mozilla SeaMonkey | =2.8-beta4 | |
Mozilla SeaMonkey | =2.8-beta5 | |
Mozilla SeaMonkey | =2.8-beta6 | |
Mozilla SeaMonkey | =2.9-beta1 | |
Mozilla SeaMonkey | =2.9-beta2 | |
Mozilla SeaMonkey | =2.9-beta3 | |
Thunderbird | =5.0 | |
Thunderbird | =6.0 | |
Thunderbird | =6.0.1 | |
Thunderbird | =6.0.2 | |
Thunderbird | =7.0 | |
Thunderbird | =7.0.1 | |
Thunderbird | =8.0 | |
Thunderbird | =9.0 | |
Thunderbird | =9.0.1 | |
Thunderbird | =10.0 | |
Thunderbird | =10.0.1 | |
Thunderbird | =10.0.2 | |
Thunderbird | =10.0.3 | |
Thunderbird | =10.0.4 | |
Thunderbird | =11.0 | |
Thunderbird | =12.0 | |
Mozilla Thunderbird | =10.0 | |
Mozilla Thunderbird | =10.0.1 | |
Mozilla Thunderbird | =10.0.2 | |
Mozilla Thunderbird | =10.0.3 | |
Mozilla Thunderbird | =10.0.4 | |
Firefox ESR | =10.0 | |
Firefox ESR | =10.0.1 | |
Firefox ESR | =10.0.2 | |
Firefox ESR | =10.0.3 | |
Firefox ESR | =10.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1947 has a severity rating of critical due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2012-1947, update your Mozilla Firefox, Thunderbird, or SeaMonkey to the latest patched version.
CVE-2012-1947 affects Mozilla Firefox versions 4.x through 12.0 and specific versions of Thunderbird and SeaMonkey.
Yes, CVE-2012-1947 can be exploited through specially crafted web content delivered to vulnerable versions of web browsers.
CVE-2012-1947 is classified as a heap-based buffer overflow vulnerability.