First published: Wed Dec 11 2013(Updated: )
The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <26.0 | |
Mozilla Firefox ESR | >=24.0<24.2 | |
Mozilla SeaMonkey | <2.23 | |
Mozilla Thunderbird | <24.2 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp3 | |
openSUSE | =12.2 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
Fedora | =18 | |
Fedora | =19 | |
Fedora | =20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5615 has an unspecified impact that can potentially allow for remote attacks due to improper enforcement of type restrictions.
To mitigate CVE-2013-5615, update your Mozilla Firefox, Firefox ESR, Thunderbird, or SeaMonkey to the latest version available.
CVE-2013-5615 affects Mozilla Firefox versions before 26.0, Firefox ESR versions before 24.2, Thunderbird versions before 24.2, and SeaMonkey versions before 2.23.
CVE-2013-5615 impacts various applications on multiple operating systems, including Ubuntu Linux and SUSE Linux.
Yes, CVE-2013-5615 can be exploited remotely due to the nature of the vulnerability in the JavaScript implementation.