First published: Sun Jan 13 2013(Updated: )
Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <17.0.2 | |
Firefox | <18.0 | |
Mozilla SeaMonkey | <2.15 | |
Thunderbird | <17.0.2 | |
Mozilla Thunderbird | <17.0.2 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Firefox ESR | <17.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0768 is classified as a critical vulnerability due to the potential for remote code execution.
To mitigate CVE-2013-0768, update your Mozilla Firefox, Thunderbird, SeaMonkey, or relevant software to the latest version beyond the vulnerable releases.
CVE-2013-0768 affects Firefox versions before 18.0, Thunderbird versions before 17.0.2, and SeaMonkey versions before 2.15.
Yes, CVE-2013-0768 can be exploited remotely through crafted HTML documents.
CVE-2013-0768 impacts web browsers and email clients, specifically Mozilla Firefox, Thunderbird, and SeaMonkey.