First published: Tue Feb 19 2013(Updated: )
Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <19.0 | |
Mozilla Firefox ESR | <17.0.3 | |
Mozilla SeaMonkey | <2.16 | |
Mozilla Thunderbird | <17.0.3 | |
Mozilla Thunderbird ESR | <17.0.3 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
redhat enterprise linux aus | =5.9 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =5.9 | |
redhat enterprise Linux eus | =6.3 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
Debian GNU/Linux | =7.0 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Mozilla Firefox and Thunderbird | <17.0.3 | |
Mozilla Firefox and Thunderbird | <19.0 | |
Mozilla Firefox and Thunderbird | <17.0.3 | |
Mozilla Thunderbird | <17.0.3 | |
Open edX | =11.4 | |
Open edX | =12.1 | |
Open edX | =12.2 | |
Red Hat Enterprise Linux | =5.9 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =5.9 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0780 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2013-0780, update your affected Mozilla Firefox, Thunderbird, or SeaMonkey installations to the latest versions available.
CVE-2013-0780 affects Mozilla Firefox versions prior to 19.0, Firefox ESR versions prior to 17.0.3, and other specific versions of Thunderbird and SeaMonkey.
CVE-2013-0780 impacts multiple platforms including various Linux distributions such as openSUSE, Red Hat, and Ubuntu.
Yes, CVE-2013-0780 can be exploited by remote attackers to execute arbitrary code on a vulnerable system.