First published: Thu Jan 31 2013(Updated: )
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux | =6.0 | |
Pale Moon | <15.4 | |
Pale Moon | <=15.3.2 | |
Pale Moon | =4.0 | |
Pale Moon | =4.0.3 | |
Pale Moon | =4.0.5 | |
Pale Moon | =4.0.6 | |
Pale Moon | =4.0.7 | |
Pale Moon | =5.0 | |
Pale Moon | =6.0 | |
Pale Moon | =6.0.2 | |
Pale Moon | =7.0 | |
Pale Moon | =7.0.1 | |
Pale Moon | =9.0 | |
Pale Moon | =9.0.1 | |
Pale Moon | =9.1 | |
Pale Moon | =9.2 | |
Pale Moon | =11.0 | |
Pale Moon | =11.0.1 | |
Pale Moon | =12.0 | |
Pale Moon | =12.1 | |
Pale Moon | =12.2 | |
Pale Moon | =12.2.1 | |
Pale Moon | =12.3 | |
Pale Moon | =12.3-r2 | |
Pale Moon | =15.0 | |
Pale Moon | =15.1 | |
Pale Moon | =15.1.1 | |
Pale Moon | =15.2 | |
Pale Moon | =15.2.1 | |
Pale Moon | =15.3 | |
Pale Moon | =15.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-1591 is currently unspecified, but it is classified as a stack-based buffer overflow vulnerability.
To fix CVE-2013-1591, upgrade to the latest version of Pale Moon or affected Red Hat products as noted in the security advisories.
CVE-2013-1591 affects several versions of Pale Moon and specific versions of Red Hat Enterprise Virtualization and Enterprise Linux.
CVE-2013-1591 has unspecified impact and context-dependent attack vectors primarily related to the buffer overflow in libpixman.
While the specifics are not detailed, stack-based buffer overflow vulnerabilities can potentially lead to remote code execution if exploited.