Exploited
CWE
119 665
Advisory Published
Updated

CVE-2013-1675: Mozilla Firefox Information Disclosure Vulnerability

First published: Thu May 16 2013(Updated: )

Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.

Credit: security@mozilla.org security@mozilla.org

Affected SoftwareAffected VersionHow to fix
Mozilla Firefox
Mozilla Firefox<=20.0.1
Mozilla Firefox=19.0
Mozilla Firefox=19.0.1
Mozilla Firefox=19.0.2
Mozilla Firefox=20.0
Mozilla Firefox ESR=17.0
Mozilla Firefox ESR=17.0.1
Mozilla Firefox ESR=17.0.2
Mozilla Firefox ESR=17.0.3
Mozilla Firefox ESR=17.0.4
Mozilla Firefox ESR=17.0.5
Mozilla Thunderbird<=17.0.5
Mozilla Thunderbird=17.0
Mozilla Thunderbird=17.0.1
Mozilla Thunderbird=17.0.2
Mozilla Thunderbird=17.0.3
Mozilla Thunderbird=17.0.4
Mozilla Thunderbird ESR=17.0
Mozilla Thunderbird ESR=17.0.1
Mozilla Thunderbird ESR=17.0.2
Mozilla Thunderbird ESR=17.0.3
Mozilla Thunderbird ESR=17.0.4
Mozilla Thunderbird ESR=17.0.5
Mozilla Firefox<21.0
Mozilla Firefox>=17.0<17.0.6
Mozilla Thunderbird<17.0.6
Mozilla Thunderbird ESR>=17.0<17.0.6
Ubuntu=12.04
Ubuntu=12.10
Ubuntu=13.04
Debian=7.0
Red Hat Gluster Storage Server=2.1
redhat enterprise Linux desktop=5.0
redhat enterprise Linux desktop=6.0
redhat enterprise Linux eus=5.9
redhat enterprise Linux eus=6.4
redhat enterprise Linux for ibm z systems=5.0_s390x
redhat enterprise Linux for ibm z systems=6.0_s390x
redhat enterprise Linux for ibm z systems eus=5.9_s390x
redhat enterprise Linux for ibm z systems eus=6.4_s390x
redhat enterprise Linux for power big endian=5.0_ppc
redhat enterprise Linux for power big endian=6.0_ppc64
redhat enterprise Linux for power big endian eus=5.9_ppc
redhat enterprise Linux for power big endian eus=6.4_ppc64
redhat enterprise Linux for scientific computing=6.0
redhat enterprise Linux server=5.0
redhat enterprise Linux server=6.0
redhat enterprise Linux server aus=5.9
redhat enterprise Linux server aus=6.4
Red Hat Enterprise Linux Server Supplementary EUS=5.9
Red Hat Enterprise Linux Server Supplementary EUS=6.4
redhat enterprise Linux workstation=5.0
redhat enterprise Linux workstation=6.0
openSUSE=12.2
openSUSE=12.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2013-1675?

    CVE-2013-1675 has a severity rating that allows remote attackers to exploit it for potential privilege escalation.

  • How do I fix CVE-2013-1675?

    To fix CVE-2013-1675, users should upgrade to Mozilla Firefox versions 21.0 or later, or to Firefox ESR 17.0.6 or later.

  • Which versions of software are affected by CVE-2013-1675?

    CVE-2013-1675 affects Mozilla Firefox versions before 21.0 and Firefox ESR 17.x before 17.0.6, as well as Thunderbird versions before 17.0.6.

  • What type of vulnerability is CVE-2013-1675?

    CVE-2013-1675 is a vulnerability related to improper initialization of data structures in Mozilla products.

  • Can CVE-2013-1675 be exploited remotely?

    Yes, CVE-2013-1675 can potentially be exploited by remote attackers.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203