First published: Tue Feb 19 2013(Updated: )
The Chrome Object Wrapper (COW) and System Only Wrapper (SOW) implementations in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent modifications to a prototype, which allows remote attackers to obtain sensitive information from chrome objects or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <17.0.3 | |
Mozilla Firefox | <19.0 | |
Mozilla SeaMonkey | <2.16 | |
Mozilla Thunderbird | <17.0.3 | |
Mozilla Thunderbird ESR | <17.0.3 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
Debian GNU/Linux | =7.0 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Mozilla Firefox ESR | <17.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0773 is classified as a moderate severity vulnerability.
To fix CVE-2013-0773, update your browser or email client to the latest version available that addresses this vulnerability.
CVE-2013-0773 affects Mozilla Firefox versions prior to 19.0, Firefox ESR versions prior to 17.0.3, Thunderbird versions prior to 17.0.3, and other related software like SeaMonkey.
CVE-2013-0773 is a prototype pollution vulnerability that can allow remote attackers to modify the prototype.
Yes, CVE-2013-0773 can be exploited remotely, allowing attackers to potentially manipulate the behavior of affected applications.