First published: Tue Feb 19 2013(Updated: )
Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <17.0.3 | |
Firefox | <19.0 | |
Mozilla SeaMonkey | <2.16 | |
Thunderbird | <17.0.3 | |
Mozilla Thunderbird | <17.0.3 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
Red Hat Enterprise Linux | =5.9 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =5.9 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Debian | =7.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Firefox ESR | <17.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0782 has a high severity level due to its potential for allowing remote code execution.
To fix CVE-2013-0782, update Mozilla Firefox, Thunderbird, or SeaMonkey to the latest versions that are not affected.
CVE-2013-0782 affects Mozilla Firefox versions before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16.
Yes, CVE-2013-0782 can be exploited remotely by attackers to execute arbitrary code.
CVE-2013-0782 is not limited to specific operating systems but affects various versions of browsers across platforms.