10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.971 High
EPSS
Percentile
99.8%
Versions of Thunderbird less than 17.0.2 are potentially affected by the following security issues :
Two intermediate certificates were improperly issued by TURKTRUST certificate authority. (CVE-2013-0743)
A use-after-free error exists related to displaying HTML tables with many columns and column groups. (CVE-2013-0744)
An error exists related to the βAutoWrapperChangerβ class that does not properly manage objects during garbage collection. (CVE-2012-0745)
An error exists related to βjsvalβ, βquickstubsβ, and compartmental mismatches that could lead to potentially exploitable crashes. (CVE-2013-0746)
Errors exist related to events in the plugin handler that could allow same-origin policy bypass. (CVE-2013-0747)
An error related to the βtoStringβ method of XBL objects could lead to address information leakage. (CVE-2013-0748)
An unspecified memory corruption issue exists. (CVE-2013-0749, CVE-2013-0769)
A buffer overflow exists related to JavaScript string concatenation. (CVE-2013-0750)
An error exists related to multiple XML bindings with SVG content, contained in XBL files. (CVE-2013-0752)
A use-after-free error exists related to βXMLSerializerβ and βserializeToStreamβ. (CVE-2013-0753)
A use-after-free error exists related to garbage collection and βListenManagerβ. (CVE-2013-0754)
A use-after-free error exists related to the βVibrateβ library and βdomDocβ. (CVE-2013-0755)
A use-after-free error exists related to JavaScript βProxyβ objects. (CVE-2013-0756)
βChrome Object Wrappersβ (COW) can be bypassed by changing object prototypes, which could allow arbitrary code execution. (CVE-2013-0757)
An error related to SVG elements and plugins could allow privilege escalation. (CVE-2013-0758)
An error exists related to the address bar that could allow URL spoofing attacks. (CVE-2013-0759)
Multiple, unspecified use-after-free, out-of-bounds read and buffer overflow errors exist. (CVE-2013-0761, CVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771)
An error exists related to SSL and threading that could result in potentially exploitable crashes. (CVE-2013-0764)
An error exists related to βCanvasβ and bad height or width values passed to it from HTML. (CVE-2013-0768)
Binary data 801308.prm
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771
www.mozilla.org/security/announce/2012/mfsa2013-01.html
www.mozilla.org/security/announce/2012/mfsa2013-02.html
www.mozilla.org/security/announce/2012/mfsa2013-03.html
www.mozilla.org/security/announce/2012/mfsa2013-04.html
www.mozilla.org/security/announce/2012/mfsa2013-05.html
www.mozilla.org/security/announce/2012/mfsa2013-06.html
www.mozilla.org/security/announce/2012/mfsa2013-07.html
www.mozilla.org/security/announce/2012/mfsa2013-08.html
www.mozilla.org/security/announce/2012/mfsa2013-09.html
www.mozilla.org/security/announce/2012/mfsa2013-10.html
www.mozilla.org/security/announce/2012/mfsa2013-11.html
www.mozilla.org/security/announce/2012/mfsa2013-12.html
www.mozilla.org/security/announce/2012/mfsa2013-13.html
www.mozilla.org/security/announce/2012/mfsa2013-14.html
www.mozilla.org/security/announce/2012/mfsa2013-15.html
www.mozilla.org/security/announce/2012/mfsa2013-16.html
www.mozilla.org/security/announce/2012/mfsa2013-17.html
www.mozilla.org/security/announce/2012/mfsa2013-18.html
www.mozilla.org/security/announce/2012/mfsa2013-19.html
www.mozilla.org/security/announce/2012/mfsa2013-20.html