First published: Wed Nov 21 2012(Updated: )
Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving the setting of Cascading Style Sheets (CSS) properties in conjunction with SVG text.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <17.0 | |
Mozilla SeaMonkey | <2.14 | |
Mozilla Thunderbird | <17.0 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp4 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
suse linux enterprise server vmware | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5836 has a high severity rating as it allows remote code execution or denial of service through manipulated CSS properties in SVG text.
To fix CVE-2012-5836, upgrade to Mozilla Firefox version 17.0 or later, Thunderbird version 17.0 or later, or SeaMonkey version 2.14 or later.
CVE-2012-5836 affects Mozilla Firefox versions prior to 17.0, Thunderbird versions prior to 17.0, SeaMonkey versions prior to 2.14, and certain versions of openSUSE and Ubuntu.
Yes, CVE-2012-5836 can potentially lead to data breaches since it allows for arbitrary code execution by attackers.
If unable to update due to compatibility issues, consider implementing additional security measures such as using a different browser or disabling JavaScript.