First published: Tue Feb 19 2013(Updated: )
Use-after-free vulnerability in the nsPrintEngine::CommonPrint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <17.0.3 | |
Firefox | <19.0 | |
Mozilla SeaMonkey | <2.16 | |
Thunderbird | <17.0.3 | |
Mozilla Thunderbird | <17.0.3 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Firefox ESR | <17.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0781 is a critical vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service on affected systems.
To fix CVE-2013-0781, update your Mozilla Firefox, Thunderbird, or SeaMonkey to the latest version that is not affected by the vulnerability.
CVE-2013-0781 affects Mozilla Firefox versions before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16.
Yes, CVE-2013-0781 can potentially lead to data breaches as it allows remote attackers to execute arbitrary code.
Systems running affected versions of Mozilla Firefox, Thunderbird, SeaMonkey, and specific versions of openSUSE and Ubuntu are vulnerable to CVE-2013-0781.