First published: Wed Nov 21 2012(Updated: )
The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <10.0.11 | |
Firefox | <17.0 | |
Mozilla SeaMonkey | <2.14 | |
Thunderbird | <17.0 | |
Mozilla Thunderbird | <10.0.11 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Firefox ESR | <10.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5833 is classified as a critical vulnerability that allows remote attackers to execute arbitrary code.
CVE-2012-5833 affects Mozilla Firefox versions before 17.0, Thunderbird versions before 17.0, and various versions of SeaMonkey and Firefox ESR.
To fix CVE-2012-5833, users should update affected software to the latest version provided by the vendor.
Yes, CVE-2012-5833 can potentially lead to data breaches by allowing attackers to execute arbitrary code on vulnerable systems.
While specific exploits are not publicly detailed, the vulnerability's existence indicates that it can be exploited by attackers.