First published: Sun Jan 13 2013(Updated: )
The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <18.0 | |
Firefox | >=10.0<10.0.12 | |
Firefox | >=17.0<17.0.2 | |
Mozilla SeaMonkey | <2.15 | |
Thunderbird | <17.0.2 | |
Mozilla Thunderbird | >=10.0<10.0.12 | |
Mozilla Thunderbird | >=17.0<17.0.2 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =5.9 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =5.9 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Firefox ESR | >=10.0<10.0.12 | |
Firefox ESR | >=17.0<17.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-0748 is classified as moderate, as it can potentially allow remote attackers to bypass Address Space Layout Randomization (ASLR).
CVE-2013-0748 affects Mozilla Firefox versions before 18.0 and specific ESR versions before 10.0.12 and 17.0.2.
To fix CVE-2013-0748, users should update their Mozilla Firefox, Thunderbird, or SeaMonkey to the latest version available.
Yes, CVE-2013-0748 also affects specific versions of Mozilla Thunderbird, SeaMonkey, and some versions of openSUSE and Red Hat Enterprise Linux.
CVE-2013-0748 is a security vulnerability that makes it easier for remote attackers to exploit memory corruption and bypass ASLR.