First published: Wed Jul 18 2012(Updated: )
Use-after-free vulnerability in the nsSMILTimeValueSpec::IsEventBased function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code by interacting with objects used for SMIL Timing.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =4.0 | |
Firefox | =4.0-beta1 | |
Firefox | =4.0-beta10 | |
Firefox | =4.0-beta11 | |
Firefox | =4.0-beta12 | |
Firefox | =4.0-beta2 | |
Firefox | =4.0-beta3 | |
Firefox | =4.0-beta4 | |
Firefox | =4.0-beta5 | |
Firefox | =4.0-beta6 | |
Firefox | =4.0-beta7 | |
Firefox | =4.0-beta8 | |
Firefox | =4.0-beta9 | |
Firefox | =4.0.1 | |
Firefox | =5.0 | |
Firefox | =5.0.1 | |
Firefox | =6.0 | |
Firefox | =6.0.1 | |
Firefox | =6.0.2 | |
Firefox | =7.0 | |
Firefox | =7.0.1 | |
Firefox | =8.0 | |
Firefox | =8.0.1 | |
Firefox | =9.0 | |
Firefox | =9.0.1 | |
Firefox | =11.0 | |
Firefox | =12.0 | |
Firefox | =12.0-beta6 | |
Firefox | =13.0 | |
Firefox | =10.0 | |
Firefox | =10.0.1 | |
Firefox | =10.0.2 | |
Firefox | =10.0.3 | |
Firefox | =10.0.4 | |
Firefox | =10.0.5 | |
Thunderbird | =5.0 | |
Thunderbird | =6.0 | |
Thunderbird | =6.0.1 | |
Thunderbird | =6.0.2 | |
Thunderbird | =7.0 | |
Thunderbird | =7.0.1 | |
Thunderbird | =8.0 | |
Thunderbird | =9.0 | |
Thunderbird | =9.0.1 | |
Thunderbird | =10.0 | |
Thunderbird | =10.0.1 | |
Thunderbird | =10.0.2 | |
Thunderbird | =10.0.3 | |
Thunderbird | =10.0.4 | |
Thunderbird | =11.0 | |
Thunderbird | =12.0 | |
Thunderbird | =13.0 | |
Mozilla Thunderbird | =10.0 | |
Mozilla Thunderbird | =10.0.1 | |
Mozilla Thunderbird | =10.0.2 | |
Mozilla Thunderbird | =10.0.3 | |
Mozilla Thunderbird | =10.0.4 | |
Mozilla Thunderbird | =10.0.5 | |
Mozilla SeaMonkey | <=2.10 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0-alpha | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.7 | |
Mozilla SeaMonkey | =1.0.8 | |
Mozilla SeaMonkey | =1.0.9 | |
Mozilla SeaMonkey | =1.1 | |
Mozilla SeaMonkey | =1.1-alpha | |
Mozilla SeaMonkey | =1.1-beta | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =1.1.4 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.1.6 | |
Mozilla SeaMonkey | =1.1.7 | |
Mozilla SeaMonkey | =1.1.8 | |
Mozilla SeaMonkey | =1.1.9 | |
Mozilla SeaMonkey | =1.1.10 | |
Mozilla SeaMonkey | =1.1.11 | |
Mozilla SeaMonkey | =1.1.12 | |
Mozilla SeaMonkey | =1.1.13 | |
Mozilla SeaMonkey | =1.1.14 | |
Mozilla SeaMonkey | =1.1.15 | |
Mozilla SeaMonkey | =1.1.16 | |
Mozilla SeaMonkey | =1.1.17 | |
Mozilla SeaMonkey | =1.1.18 | |
Mozilla SeaMonkey | =1.1.19 | |
Mozilla SeaMonkey | =1.5.0.8 | |
Mozilla SeaMonkey | =1.5.0.9 | |
Mozilla SeaMonkey | =1.5.0.10 | |
Mozilla SeaMonkey | =2.0 | |
Mozilla SeaMonkey | =2.0-alpha_1 | |
Mozilla SeaMonkey | =2.0-alpha_2 | |
Mozilla SeaMonkey | =2.0-alpha_3 | |
Mozilla SeaMonkey | =2.0-beta_1 | |
Mozilla SeaMonkey | =2.0-beta_2 | |
Mozilla SeaMonkey | =2.0-rc1 | |
Mozilla SeaMonkey | =2.0-rc2 | |
Mozilla SeaMonkey | =2.0.1 | |
Mozilla SeaMonkey | =2.0.2 | |
Mozilla SeaMonkey | =2.0.3 | |
Mozilla SeaMonkey | =2.0.4 | |
Mozilla SeaMonkey | =2.0.5 | |
Mozilla SeaMonkey | =2.0.6 | |
Mozilla SeaMonkey | =2.0.7 | |
Mozilla SeaMonkey | =2.0.8 | |
Mozilla SeaMonkey | =2.0.9 | |
Mozilla SeaMonkey | =2.0.10 | |
Mozilla SeaMonkey | =2.0.11 | |
Mozilla SeaMonkey | =2.0.12 | |
Mozilla SeaMonkey | =2.0.13 | |
Mozilla SeaMonkey | =2.0.14 | |
Mozilla SeaMonkey | =2.1 | |
Mozilla SeaMonkey | =2.1-alpha1 | |
Mozilla SeaMonkey | =2.1-alpha2 | |
Mozilla SeaMonkey | =2.1-alpha3 | |
Mozilla SeaMonkey | =2.1-beta1 | |
Mozilla SeaMonkey | =2.1-beta2 | |
Mozilla SeaMonkey | =2.1-beta3 | |
Mozilla SeaMonkey | =2.1-rc1 | |
Mozilla SeaMonkey | =2.1-rc2 | |
Firefox ESR | =10.0 | |
Firefox ESR | =10.0.1 | |
Firefox ESR | =10.0.2 | |
Firefox ESR | =10.0.3 | |
Firefox ESR | =10.0.4 | |
Firefox ESR | =10.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1951 is classified as a high severity vulnerability that can lead to denial of service.
To fix CVE-2012-1951, update your affected software to the latest version provided by Mozilla.
CVE-2012-1951 affects Mozilla Firefox versions 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11.
CVE-2012-1951 can be exploited by remote attackers to cause a denial of service via a use-after-free condition.
The best approach to mitigate CVE-2012-1951 is to upgrade the affected software, as there are no known workarounds.