First published: Wed Oct 10 2012(Updated: )
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <10.0.8 | |
Mozilla Thunderbird ESR | <10.0.8 | |
Mozilla Firefox | <16.0 | |
Mozilla Thunderbird | <16.0 | |
Mozilla SeaMonkey | <2.13 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =11.04 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =6.3 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp4 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp3 | |
suse linux enterprise server vmware | =11-sp3 | |
Mozilla Firefox | <10.0.8 | |
Ubuntu | =10.04 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4187 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2012-4187, update your Mozilla Firefox, Thunderbird, or SeaMonkey to the latest versions that address this vulnerability.
CVE-2012-4187 affects Mozilla Firefox versions before 16.0, Thunderbird versions before 16.0, and SeaMonkey versions before 2.13.
Yes, CVE-2012-4187 can potentially lead to data loss, as it may allow an attacker to execute arbitrary code.
There are no recommended workarounds for CVE-2012-4187, and the best solution is to apply the available updates.