First published: Thu May 16 2013(Updated: )
Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | ||
Mozilla Firefox | <=20.0.1 | |
Mozilla Firefox | =19.0 | |
Mozilla Firefox | =19.0.1 | |
Mozilla Firefox | =19.0.2 | |
Mozilla Firefox | =20.0 | |
Mozilla Firefox ESR | =17.0 | |
Mozilla Firefox ESR | =17.0.1 | |
Mozilla Firefox ESR | =17.0.2 | |
Mozilla Firefox ESR | =17.0.3 | |
Mozilla Firefox ESR | =17.0.4 | |
Mozilla Firefox ESR | =17.0.5 | |
Mozilla Thunderbird | <=17.0.5 | |
Mozilla Thunderbird | =17.0 | |
Mozilla Thunderbird | =17.0.1 | |
Mozilla Thunderbird | =17.0.2 | |
Mozilla Thunderbird | =17.0.3 | |
Mozilla Thunderbird | =17.0.4 | |
Mozilla Thunderbird ESR | =17.0 | |
Mozilla Thunderbird ESR | =17.0.1 | |
Mozilla Thunderbird ESR | =17.0.2 | |
Mozilla Thunderbird ESR | =17.0.3 | |
Mozilla Thunderbird ESR | =17.0.4 | |
Mozilla Thunderbird ESR | =17.0.5 | |
Mozilla Firefox | <21.0 | |
Mozilla Firefox | >=17.0<17.0.6 | |
Mozilla Thunderbird | <17.0.6 | |
Mozilla Thunderbird ESR | >=17.0<17.0.6 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Debian | =7.0 | |
Red Hat Gluster Storage Server | =2.1 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =5.9 | |
redhat enterprise Linux eus | =6.4 | |
redhat enterprise Linux for ibm z systems | =5.0_s390x | |
redhat enterprise Linux for ibm z systems | =6.0_s390x | |
redhat enterprise Linux for ibm z systems eus | =5.9_s390x | |
redhat enterprise Linux for ibm z systems eus | =6.4_s390x | |
redhat enterprise Linux for power big endian | =5.0_ppc | |
redhat enterprise Linux for power big endian | =6.0_ppc64 | |
redhat enterprise Linux for power big endian eus | =5.9_ppc | |
redhat enterprise Linux for power big endian eus | =6.4_ppc64 | |
redhat enterprise Linux for scientific computing | =6.0 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =5.9 | |
redhat enterprise Linux server aus | =6.4 | |
Red Hat Enterprise Linux Server Supplementary EUS | =5.9 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.4 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
openSUSE | =12.2 | |
openSUSE | =12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1675 has a severity rating that allows remote attackers to exploit it for potential privilege escalation.
To fix CVE-2013-1675, users should upgrade to Mozilla Firefox versions 21.0 or later, or to Firefox ESR 17.0.6 or later.
CVE-2013-1675 affects Mozilla Firefox versions before 21.0 and Firefox ESR 17.x before 17.0.6, as well as Thunderbird versions before 17.0.6.
CVE-2013-1675 is a vulnerability related to improper initialization of data structures in Mozilla products.
Yes, CVE-2013-1675 can potentially be exploited by remote attackers.