First published: Wed Oct 30 2013(Updated: )
Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | <=2.22 | |
Mozilla SeaMonkey | =2.0 | |
Mozilla SeaMonkey | =2.0-alpha_1 | |
Mozilla SeaMonkey | =2.0-alpha_2 | |
Mozilla SeaMonkey | =2.0-alpha_3 | |
Mozilla SeaMonkey | =2.0-beta_1 | |
Mozilla SeaMonkey | =2.0-beta_2 | |
Mozilla SeaMonkey | =2.0-rc1 | |
Mozilla SeaMonkey | =2.0-rc2 | |
Mozilla SeaMonkey | =2.0.1 | |
Mozilla SeaMonkey | =2.0.2 | |
Mozilla SeaMonkey | =2.0.3 | |
Mozilla SeaMonkey | =2.0.4 | |
Mozilla SeaMonkey | =2.0.5 | |
Mozilla SeaMonkey | =2.0.6 | |
Mozilla SeaMonkey | =2.0.7 | |
Mozilla SeaMonkey | =2.0.8 | |
Mozilla SeaMonkey | =2.0.9 | |
Mozilla SeaMonkey | =2.0.10 | |
Mozilla SeaMonkey | =2.0.11 | |
Mozilla SeaMonkey | =2.0.12 | |
Mozilla SeaMonkey | =2.0.13 | |
Mozilla SeaMonkey | =2.0.14 | |
Mozilla SeaMonkey | =2.1 | |
Mozilla SeaMonkey | =2.1-alpha1 | |
Mozilla SeaMonkey | =2.1-alpha2 | |
Mozilla SeaMonkey | =2.1-alpha3 | |
Mozilla SeaMonkey | =2.1-beta1 | |
Mozilla SeaMonkey | =2.1-beta2 | |
Mozilla SeaMonkey | =2.1-beta3 | |
Mozilla SeaMonkey | =2.1-rc1 | |
Mozilla SeaMonkey | =2.1-rc2 | |
Mozilla SeaMonkey | =2.10 | |
Mozilla SeaMonkey | =2.10-beta1 | |
Mozilla SeaMonkey | =2.10-beta2 | |
Mozilla SeaMonkey | =2.10-beta3 | |
Mozilla SeaMonkey | =2.10.1 | |
Mozilla SeaMonkey | =2.11 | |
Mozilla SeaMonkey | =2.11-beta1 | |
Mozilla SeaMonkey | =2.11-beta2 | |
Mozilla SeaMonkey | =2.11-beta3 | |
Mozilla SeaMonkey | =2.11-beta4 | |
Mozilla SeaMonkey | =2.11-beta5 | |
Mozilla SeaMonkey | =2.11-beta6 | |
Mozilla SeaMonkey | =2.12 | |
Mozilla SeaMonkey | =2.12-beta1 | |
Mozilla SeaMonkey | =2.12-beta2 | |
Mozilla SeaMonkey | =2.12-beta3 | |
Mozilla SeaMonkey | =2.12-beta4 | |
Mozilla SeaMonkey | =2.12-beta5 | |
Mozilla SeaMonkey | =2.12-beta6 | |
Mozilla SeaMonkey | =2.12.1 | |
Mozilla SeaMonkey | =2.13 | |
Mozilla SeaMonkey | =2.13-beta1 | |
Mozilla SeaMonkey | =2.13-beta2 | |
Mozilla SeaMonkey | =2.13-beta3 | |
Mozilla SeaMonkey | =2.13-beta4 | |
Mozilla SeaMonkey | =2.13-beta5 | |
Mozilla SeaMonkey | =2.13-beta6 | |
Mozilla SeaMonkey | =2.13.1 | |
Mozilla SeaMonkey | =2.13.2 | |
Mozilla SeaMonkey | =2.14 | |
Mozilla SeaMonkey | =2.14-beta1 | |
Mozilla SeaMonkey | =2.14-beta2 | |
Mozilla SeaMonkey | =2.14-beta3 | |
Mozilla SeaMonkey | =2.14-beta4 | |
Mozilla SeaMonkey | =2.14-beta5 | |
Mozilla SeaMonkey | =2.15 | |
Mozilla SeaMonkey | =2.15-beta1 | |
Mozilla SeaMonkey | =2.15-beta2 | |
Mozilla SeaMonkey | =2.15-beta3 | |
Mozilla SeaMonkey | =2.15-beta4 | |
Mozilla SeaMonkey | =2.15-beta5 | |
Mozilla SeaMonkey | =2.15-beta6 | |
Mozilla SeaMonkey | =2.15.1 | |
Mozilla SeaMonkey | =2.15.2 | |
Mozilla SeaMonkey | =2.16 | |
Mozilla SeaMonkey | =2.16-beta1 | |
Mozilla SeaMonkey | =2.16-beta2 | |
Mozilla SeaMonkey | =2.16-beta3 | |
Mozilla SeaMonkey | =2.16-beta4 | |
Mozilla SeaMonkey | =2.16-beta5 | |
Mozilla SeaMonkey | =2.16.1 | |
Mozilla SeaMonkey | =2.16.2 | |
Mozilla SeaMonkey | =2.17 | |
Mozilla SeaMonkey | =2.17-beta1 | |
Mozilla SeaMonkey | =2.17-beta2 | |
Mozilla SeaMonkey | =2.17-beta3 | |
Mozilla SeaMonkey | =2.17-beta4 | |
Mozilla SeaMonkey | =2.17.1 | |
Mozilla SeaMonkey | =2.18-beta1 | |
Mozilla SeaMonkey | =2.18-beta2 | |
Mozilla SeaMonkey | =2.18-beta3 | |
Mozilla SeaMonkey | =2.18-beta4 | |
Mozilla SeaMonkey | =2.19 | |
Mozilla SeaMonkey | =2.19-beta1 | |
Mozilla SeaMonkey | =2.19-beta2 | |
Mozilla SeaMonkey | =2.20 | |
Mozilla SeaMonkey | =2.20-beta1 | |
Mozilla SeaMonkey | =2.20-beta2 | |
Mozilla SeaMonkey | =2.20-beta3 | |
Mozilla SeaMonkey | =2.21-beta1 | |
Mozilla SeaMonkey | =2.21-beta2 | |
Mozilla SeaMonkey | =2.22-beta1 | |
Firefox | <=24.0 | |
Firefox | =19.0 | |
Firefox | =19.0.1 | |
Firefox | =19.0.2 | |
Firefox | =20.0 | |
Firefox | =20.0.1 | |
Firefox | =21.0 | |
Firefox | =22.0 | |
Firefox | =23.0 | |
Firefox | =23.0.1 | |
Thunderbird | <=24.0.1 | |
Thunderbird | =17.0 | |
Thunderbird | =17.0.1 | |
Thunderbird | =17.0.2 | |
Thunderbird | =17.0.3 | |
Thunderbird | =17.0.4 | |
Thunderbird | =17.0.5 | |
Thunderbird | =17.0.6 | |
Thunderbird | =17.0.7 | |
Thunderbird | =17.0.8 | |
Thunderbird | =24.0 | |
Mozilla Thunderbird | =17.0.9 | |
Firefox | =17.0 | |
Firefox | =17.0.1 | |
Firefox | =17.0.2 | |
Firefox | =17.0.3 | |
Firefox | =17.0.4 | |
Firefox | =17.0.5 | |
Firefox | =17.0.6 | |
Firefox | =17.0.7 | |
Firefox | =17.0.8 | |
Firefox | =17.0.9 | |
Firefox | =24.0 | |
Firefox ESR | =24.0.1 | |
Firefox ESR | =24.0.2 | |
Mozilla Thunderbird | =17.0 | |
Mozilla Thunderbird | =17.0.1 | |
Mozilla Thunderbird | =17.0.2 | |
Mozilla Thunderbird | =17.0.3 | |
Mozilla Thunderbird | =17.0.4 | |
Mozilla Thunderbird | =17.0.5 | |
Mozilla Thunderbird | =17.0.6 | |
Mozilla Thunderbird | =17.0.7 | |
Mozilla Thunderbird | =17.0.8 | |
Firefox ESR | =17.0 | |
Firefox ESR | =17.0.1 | |
Firefox ESR | =17.0.2 | |
Firefox ESR | =17.0.3 | |
Firefox ESR | =17.0.4 | |
Firefox ESR | =17.0.5 | |
Firefox ESR | =17.0.6 | |
Firefox ESR | =17.0.7 | |
Firefox ESR | =17.0.8 | |
Firefox ESR | =17.0.9 | |
Firefox ESR | =24.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5601 is classified as a moderate severity vulnerability.
CVE-2013-5601 allows remote attackers to execute arbitrary code on affected systems due to a use-after-free vulnerability.
CVE-2013-5601 affects Mozilla Firefox versions before 25.0, Thunderbird before 24.1, and SeaMonkey before 2.22.
To fix CVE-2013-5601, users should update their affected software to the latest version or apply any available patches.
Yes, there have been reports of exploits leveraging CVE-2013-5601 for remote code execution.