First published: Tue Feb 19 2013(Updated: )
The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <19.0 | |
Mozilla SeaMonkey | <2.16 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
Red Hat Enterprise Linux | =5.9 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =5.9 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0772 is considered a high severity vulnerability, allowing for potential information disclosure and denial of service.
To fix CVE-2013-0772, users should update to the latest version of Mozilla Firefox, Thunderbird, or SeaMonkey that addresses this vulnerability.
CVE-2013-0772 affects Mozilla Firefox versions prior to 19.0, Thunderbird versions prior to 17.0.3, and SeaMonkey versions prior to 2.16.
CVE-2013-0772 can facilitate remote attacks that lead to sensitive information disclosure from process memory or application crashes.
CVE-2013-0772 impacts multiple operating systems, including various versions of openSUSE, Red Hat Enterprise Linux, and Ubuntu Linux.