First published: Wed Nov 21 2012(Updated: )
Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <10.0.11 | |
Firefox | <17.0 | |
Mozilla SeaMonkey | <2.14 | |
Thunderbird | <17.0 | |
Mozilla Thunderbird | <10.0.11 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Firefox ESR | <10.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5840 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2012-5840, you should upgrade to the latest version of Mozilla Firefox, Thunderbird, or SeaMonkey that addresses this vulnerability.
CVE-2012-5840 affects Mozilla Firefox versions prior to 17.0, Thunderbird versions before 17.0, and SeaMonkey versions before 2.14.
Yes, CVE-2012-5840 can lead to data loss as it allows remote attackers to execute arbitrary code.
There are no known workarounds for CVE-2012-5840 besides applying the relevant software updates.