First published: Wed Aug 29 2012(Updated: )
Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <15.0 | |
Firefox | >=10.0<10.0.7 | |
Mozilla SeaMonkey | <2.12 | |
Thunderbird | <15.0 | |
Mozilla Thunderbird | >=10.0<10.0.7 | |
openSUSE | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.3 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Firefox ESR | >=10.0<10.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3963 is considered a critical vulnerability that can allow remote attackers to execute arbitrary code.
To fix CVE-2012-3963, update Mozilla Firefox, Thunderbird, SeaMonkey, or Firefox ESR to the latest version available.
CVE-2012-3963 affects versions of Mozilla Firefox before 15.0, Thunderbird before 15.0, SeaMonkey before 2.12, and Firefox ESR 10.x before 10.0.7.
Attackers can exploit CVE-2012-3963 through unspecified vectors to potentially execute arbitrary code on the victim's machine.
While specific exploits for CVE-2012-3963 may not be publicly documented, the nature of the vulnerability suggests significant risks from remote code execution.