First published: Wed Sep 18 2013(Updated: )
Integer overflow in the drawLineLoop function in the libGLESv2 library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 24.0 and SeaMonkey before 2.21, allows remote attackers to execute arbitrary code via a crafted web site.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | <=2.20 | |
Mozilla SeaMonkey | =2.0 | |
Mozilla SeaMonkey | =2.0-alpha_1 | |
Mozilla SeaMonkey | =2.0-alpha_2 | |
Mozilla SeaMonkey | =2.0-alpha_3 | |
Mozilla SeaMonkey | =2.0-beta_1 | |
Mozilla SeaMonkey | =2.0-beta_2 | |
Mozilla SeaMonkey | =2.0-rc1 | |
Mozilla SeaMonkey | =2.0-rc2 | |
Mozilla SeaMonkey | =2.0.1 | |
Mozilla SeaMonkey | =2.0.2 | |
Mozilla SeaMonkey | =2.0.3 | |
Mozilla SeaMonkey | =2.0.4 | |
Mozilla SeaMonkey | =2.0.5 | |
Mozilla SeaMonkey | =2.0.6 | |
Mozilla SeaMonkey | =2.0.7 | |
Mozilla SeaMonkey | =2.0.8 | |
Mozilla SeaMonkey | =2.0.9 | |
Mozilla SeaMonkey | =2.0.10 | |
Mozilla SeaMonkey | =2.0.11 | |
Mozilla SeaMonkey | =2.0.12 | |
Mozilla SeaMonkey | =2.0.13 | |
Mozilla SeaMonkey | =2.0.14 | |
Mozilla SeaMonkey | =2.1 | |
Mozilla SeaMonkey | =2.1-alpha1 | |
Mozilla SeaMonkey | =2.1-alpha2 | |
Mozilla SeaMonkey | =2.1-alpha3 | |
Mozilla SeaMonkey | =2.1-beta1 | |
Mozilla SeaMonkey | =2.1-beta2 | |
Mozilla SeaMonkey | =2.1-beta3 | |
Mozilla SeaMonkey | =2.1-rc1 | |
Mozilla SeaMonkey | =2.1-rc2 | |
Mozilla SeaMonkey | =2.10 | |
Mozilla SeaMonkey | =2.10-beta1 | |
Mozilla SeaMonkey | =2.10-beta2 | |
Mozilla SeaMonkey | =2.10-beta3 | |
Mozilla SeaMonkey | =2.10.1 | |
Mozilla SeaMonkey | =2.11 | |
Mozilla SeaMonkey | =2.11-beta1 | |
Mozilla SeaMonkey | =2.11-beta2 | |
Mozilla SeaMonkey | =2.11-beta3 | |
Mozilla SeaMonkey | =2.11-beta4 | |
Mozilla SeaMonkey | =2.11-beta5 | |
Mozilla SeaMonkey | =2.11-beta6 | |
Mozilla SeaMonkey | =2.12 | |
Mozilla SeaMonkey | =2.12-beta1 | |
Mozilla SeaMonkey | =2.12-beta2 | |
Mozilla SeaMonkey | =2.12-beta3 | |
Mozilla SeaMonkey | =2.12-beta4 | |
Mozilla SeaMonkey | =2.12-beta5 | |
Mozilla SeaMonkey | =2.12-beta6 | |
Mozilla SeaMonkey | =2.12.1 | |
Mozilla SeaMonkey | =2.13 | |
Mozilla SeaMonkey | =2.13-beta1 | |
Mozilla SeaMonkey | =2.13-beta2 | |
Mozilla SeaMonkey | =2.13-beta3 | |
Mozilla SeaMonkey | =2.13-beta4 | |
Mozilla SeaMonkey | =2.13-beta5 | |
Mozilla SeaMonkey | =2.13-beta6 | |
Mozilla SeaMonkey | =2.13.1 | |
Mozilla SeaMonkey | =2.13.2 | |
Mozilla SeaMonkey | =2.14 | |
Mozilla SeaMonkey | =2.14-beta1 | |
Mozilla SeaMonkey | =2.14-beta2 | |
Mozilla SeaMonkey | =2.14-beta3 | |
Mozilla SeaMonkey | =2.14-beta4 | |
Mozilla SeaMonkey | =2.14-beta5 | |
Mozilla SeaMonkey | =2.15 | |
Mozilla SeaMonkey | =2.15-beta1 | |
Mozilla SeaMonkey | =2.15-beta2 | |
Mozilla SeaMonkey | =2.15-beta3 | |
Mozilla SeaMonkey | =2.15-beta4 | |
Mozilla SeaMonkey | =2.15-beta5 | |
Mozilla SeaMonkey | =2.15-beta6 | |
Mozilla SeaMonkey | =2.15.1 | |
Mozilla SeaMonkey | =2.15.2 | |
Mozilla SeaMonkey | =2.16 | |
Mozilla SeaMonkey | =2.16-beta1 | |
Mozilla SeaMonkey | =2.16-beta2 | |
Mozilla SeaMonkey | =2.16-beta3 | |
Mozilla SeaMonkey | =2.16-beta4 | |
Mozilla SeaMonkey | =2.16-beta5 | |
Mozilla SeaMonkey | =2.16.1 | |
Mozilla SeaMonkey | =2.16.2 | |
Mozilla SeaMonkey | =2.17 | |
Mozilla SeaMonkey | =2.17-beta1 | |
Mozilla SeaMonkey | =2.17-beta2 | |
Mozilla SeaMonkey | =2.17-beta3 | |
Mozilla SeaMonkey | =2.17-beta4 | |
Mozilla SeaMonkey | =2.17.1 | |
Mozilla SeaMonkey | =2.18-beta1 | |
Mozilla SeaMonkey | =2.18-beta2 | |
Mozilla SeaMonkey | =2.18-beta3 | |
Mozilla SeaMonkey | =2.18-beta4 | |
Mozilla SeaMonkey | =2.19 | |
Mozilla SeaMonkey | =2.19-beta1 | |
Mozilla SeaMonkey | =2.19-beta2 | |
Mozilla SeaMonkey | =2.20-beta1 | |
Mozilla SeaMonkey | =2.20-beta2 | |
Mozilla SeaMonkey | =2.20-beta3 | |
Mozilla Firefox | <=23.0.1 | |
Mozilla Firefox | =19.0 | |
Mozilla Firefox | =19.0.1 | |
Mozilla Firefox | =19.0.2 | |
Mozilla Firefox | =20.0 | |
Mozilla Firefox | =20.0.1 | |
Mozilla Firefox | =21.0 | |
Mozilla Firefox | =22.0 | |
Mozilla Firefox | =23.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1721 has a high severity rating due to its potential for remote code execution.
To mitigate CVE-2013-1721, users should update Mozilla Firefox or SeaMonkey to the latest version that is no longer vulnerable.
CVE-2013-1721 affects Mozilla Firefox versions before 24.0 and SeaMonkey versions before 2.21.
CVE-2013-1721 is an integer overflow vulnerability found in the drawLineLoop function of the libGLESv2 library.
Yes, CVE-2013-1721 can be exploited remotely through specially crafted websites.