First published: Wed Dec 11 2013(Updated: )
The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <26.0 | |
Firefox ESR | >=24.0<24.2 | |
Mozilla SeaMonkey | <2.23 | |
Thunderbird | <24.2 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.5 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp3 | |
openSUSE | =12.2 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
Red Hat Fedora | =18 | |
Red Hat Fedora | =19 | |
Red Hat Fedora | =20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6671 is rated as high severity due to its potential to allow remote code execution.
To fix CVE-2013-6671, upgrade Mozilla Firefox to version 26.0 or higher, or update affected software such as Thunderbird and SeaMonkey to their respective patched versions.
CVE-2013-6671 affects Mozilla Firefox versions before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23.
Yes, CVE-2013-6671 can be exploited by remote attackers through malicious JavaScript targeting ordered list elements.
Not patching CVE-2013-6671 puts systems at risk for exploitation, potentially leading to unauthorized code execution and compromise.