Lucene search

K
cve[email protected]CVE-2013-1705
HistoryAug 07, 2013 - 1:55 a.m.

CVE-2013-1705

2013-08-0701:55:04
CWE-119
web.nvd.nist.gov
43
cve-2013-1705
buffer underflow
cryptojs
mozilla firefox
seamonkey
remote code execution
denial of service
crmf

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

Low

0.06 Low

EPSS

Percentile

93.5%

Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.

Affected configurations

NVD
Node
mozillaseamonkeyRange2.20beta3
OR
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0rc2
OR
mozillaseamonkeyMatch2.0.1
OR
mozillaseamonkeyMatch2.0.2
OR
mozillaseamonkeyMatch2.0.3
OR
mozillaseamonkeyMatch2.0.4
OR
mozillaseamonkeyMatch2.0.5
OR
mozillaseamonkeyMatch2.0.6
OR
mozillaseamonkeyMatch2.0.7
OR
mozillaseamonkeyMatch2.0.8
OR
mozillaseamonkeyMatch2.0.9
OR
mozillaseamonkeyMatch2.0.10
OR
mozillaseamonkeyMatch2.0.11
OR
mozillaseamonkeyMatch2.0.12
OR
mozillaseamonkeyMatch2.0.13
OR
mozillaseamonkeyMatch2.0.14
OR
mozillaseamonkeyMatch2.1
OR
mozillaseamonkeyMatch2.1alpha1
OR
mozillaseamonkeyMatch2.1alpha2
OR
mozillaseamonkeyMatch2.1alpha3
OR
mozillaseamonkeyMatch2.1beta1
OR
mozillaseamonkeyMatch2.1beta2
OR
mozillaseamonkeyMatch2.1beta3
OR
mozillaseamonkeyMatch2.1rc1
OR
mozillaseamonkeyMatch2.1rc2
OR
mozillaseamonkeyMatch2.2
OR
mozillaseamonkeyMatch2.2beta1
OR
mozillaseamonkeyMatch2.2beta2
OR
mozillaseamonkeyMatch2.2beta3
OR
mozillaseamonkeyMatch2.3
OR
mozillaseamonkeyMatch2.3beta1
OR
mozillaseamonkeyMatch2.3beta2
OR
mozillaseamonkeyMatch2.3beta3
OR
mozillaseamonkeyMatch2.3.1
OR
mozillaseamonkeyMatch2.3.2
OR
mozillaseamonkeyMatch2.3.3
OR
mozillaseamonkeyMatch2.4
OR
mozillaseamonkeyMatch2.4beta1
OR
mozillaseamonkeyMatch2.4beta2
OR
mozillaseamonkeyMatch2.4beta3
OR
mozillaseamonkeyMatch2.4.1
OR
mozillaseamonkeyMatch2.5
OR
mozillaseamonkeyMatch2.5beta1
OR
mozillaseamonkeyMatch2.5beta2
OR
mozillaseamonkeyMatch2.5beta3
OR
mozillaseamonkeyMatch2.5beta4
OR
mozillaseamonkeyMatch2.6
OR
mozillaseamonkeyMatch2.6beta1
OR
mozillaseamonkeyMatch2.6beta2
OR
mozillaseamonkeyMatch2.6beta3
OR
mozillaseamonkeyMatch2.6beta4
OR
mozillaseamonkeyMatch2.6.1
OR
mozillaseamonkeyMatch2.7
OR
mozillaseamonkeyMatch2.7beta1
OR
mozillaseamonkeyMatch2.7beta2
OR
mozillaseamonkeyMatch2.7beta3
OR
mozillaseamonkeyMatch2.7beta4
OR
mozillaseamonkeyMatch2.7beta5
OR
mozillaseamonkeyMatch2.7.1
OR
mozillaseamonkeyMatch2.7.2
OR
mozillaseamonkeyMatch2.8
OR
mozillaseamonkeyMatch2.8beta1
OR
mozillaseamonkeyMatch2.8beta2
OR
mozillaseamonkeyMatch2.8beta3
OR
mozillaseamonkeyMatch2.8beta4
OR
mozillaseamonkeyMatch2.8beta5
OR
mozillaseamonkeyMatch2.8beta6
OR
mozillaseamonkeyMatch2.9
OR
mozillaseamonkeyMatch2.9beta1
OR
mozillaseamonkeyMatch2.9beta2
OR
mozillaseamonkeyMatch2.9beta3
OR
mozillaseamonkeyMatch2.9beta4
OR
mozillaseamonkeyMatch2.9.1
OR
mozillaseamonkeyMatch2.10
OR
mozillaseamonkeyMatch2.10beta1
OR
mozillaseamonkeyMatch2.10beta2
OR
mozillaseamonkeyMatch2.10beta3
OR
mozillaseamonkeyMatch2.10.1
OR
mozillaseamonkeyMatch2.11
OR
mozillaseamonkeyMatch2.11beta1
OR
mozillaseamonkeyMatch2.11beta2
OR
mozillaseamonkeyMatch2.11beta3
OR
mozillaseamonkeyMatch2.11beta4
OR
mozillaseamonkeyMatch2.11beta5
OR
mozillaseamonkeyMatch2.11beta6
OR
mozillaseamonkeyMatch2.12
OR
mozillaseamonkeyMatch2.12beta1
OR
mozillaseamonkeyMatch2.12beta2
OR
mozillaseamonkeyMatch2.12beta3
OR
mozillaseamonkeyMatch2.12beta4
OR
mozillaseamonkeyMatch2.12beta5
OR
mozillaseamonkeyMatch2.12beta6
OR
mozillaseamonkeyMatch2.12.1
OR
mozillaseamonkeyMatch2.13
OR
mozillaseamonkeyMatch2.13beta1
OR
mozillaseamonkeyMatch2.13beta2
OR
mozillaseamonkeyMatch2.13beta3
OR
mozillaseamonkeyMatch2.13beta4
OR
mozillaseamonkeyMatch2.13beta5
OR
mozillaseamonkeyMatch2.13beta6
OR
mozillaseamonkeyMatch2.13.1
OR
mozillaseamonkeyMatch2.13.2
OR
mozillaseamonkeyMatch2.14
OR
mozillaseamonkeyMatch2.14beta1
OR
mozillaseamonkeyMatch2.14beta2
OR
mozillaseamonkeyMatch2.14beta3
OR
mozillaseamonkeyMatch2.14beta4
OR
mozillaseamonkeyMatch2.14beta5
OR
mozillaseamonkeyMatch2.15
OR
mozillaseamonkeyMatch2.15beta1
OR
mozillaseamonkeyMatch2.15beta2
OR
mozillaseamonkeyMatch2.15beta3
OR
mozillaseamonkeyMatch2.15beta4
OR
mozillaseamonkeyMatch2.15beta5
OR
mozillaseamonkeyMatch2.15beta6
OR
mozillaseamonkeyMatch2.15.1
OR
mozillaseamonkeyMatch2.15.2
OR
mozillaseamonkeyMatch2.16
OR
mozillaseamonkeyMatch2.16beta1
OR
mozillaseamonkeyMatch2.16beta2
OR
mozillaseamonkeyMatch2.16beta3
OR
mozillaseamonkeyMatch2.16beta4
OR
mozillaseamonkeyMatch2.16beta5
OR
mozillaseamonkeyMatch2.16.1
OR
mozillaseamonkeyMatch2.16.2
OR
mozillaseamonkeyMatch2.17
OR
mozillaseamonkeyMatch2.17beta1
OR
mozillaseamonkeyMatch2.17beta2
OR
mozillaseamonkeyMatch2.17beta3
OR
mozillaseamonkeyMatch2.17beta4
OR
mozillaseamonkeyMatch2.17.1
OR
mozillaseamonkeyMatch2.18beta1
OR
mozillaseamonkeyMatch2.18beta2
OR
mozillaseamonkeyMatch2.18beta3
OR
mozillaseamonkeyMatch2.18beta4
OR
mozillaseamonkeyMatch2.19
OR
mozillaseamonkeyMatch2.19beta1
OR
mozillaseamonkeyMatch2.19beta2
OR
mozillaseamonkeyMatch2.20beta1
OR
mozillaseamonkeyMatch2.20beta2
Node
mozillafirefoxRange22.0
OR
mozillafirefoxMatch19.0
OR
mozillafirefoxMatch19.0.1
OR
mozillafirefoxMatch19.0.2
OR
mozillafirefoxMatch20.0
OR
mozillafirefoxMatch20.0.1
OR
mozillafirefoxMatch21.0

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

Low

0.06 Low

EPSS

Percentile

93.5%