Lucene search

K
nvd[email protected]NVD:CVE-2013-1736
HistorySep 18, 2013 - 10:08 a.m.

CVE-2013-1736

2013-09-1810:08:24
CWE-119
web.nvd.nist.gov

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

Low

0.083 Low

EPSS

Percentile

94.4%

The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.

Affected configurations

NVD
Node
mozillaseamonkeyRange2.20
OR
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0rc2
OR
mozillaseamonkeyMatch2.0.1
OR
mozillaseamonkeyMatch2.0.2
OR
mozillaseamonkeyMatch2.0.3
OR
mozillaseamonkeyMatch2.0.4
OR
mozillaseamonkeyMatch2.0.5
OR
mozillaseamonkeyMatch2.0.6
OR
mozillaseamonkeyMatch2.0.7
OR
mozillaseamonkeyMatch2.0.8
OR
mozillaseamonkeyMatch2.0.9
OR
mozillaseamonkeyMatch2.0.10
OR
mozillaseamonkeyMatch2.0.11
OR
mozillaseamonkeyMatch2.0.12
OR
mozillaseamonkeyMatch2.0.13
OR
mozillaseamonkeyMatch2.0.14
OR
mozillaseamonkeyMatch2.1
OR
mozillaseamonkeyMatch2.1alpha1
OR
mozillaseamonkeyMatch2.1alpha2
OR
mozillaseamonkeyMatch2.1alpha3
OR
mozillaseamonkeyMatch2.1beta1
OR
mozillaseamonkeyMatch2.1beta2
OR
mozillaseamonkeyMatch2.1beta3
OR
mozillaseamonkeyMatch2.1rc1
OR
mozillaseamonkeyMatch2.1rc2
OR
mozillaseamonkeyMatch2.10
OR
mozillaseamonkeyMatch2.10beta1
OR
mozillaseamonkeyMatch2.10beta2
OR
mozillaseamonkeyMatch2.10beta3
OR
mozillaseamonkeyMatch2.10.1
OR
mozillaseamonkeyMatch2.11
OR
mozillaseamonkeyMatch2.11beta1
OR
mozillaseamonkeyMatch2.11beta2
OR
mozillaseamonkeyMatch2.11beta3
OR
mozillaseamonkeyMatch2.11beta4
OR
mozillaseamonkeyMatch2.11beta5
OR
mozillaseamonkeyMatch2.11beta6
OR
mozillaseamonkeyMatch2.12
OR
mozillaseamonkeyMatch2.12beta1
OR
mozillaseamonkeyMatch2.12beta2
OR
mozillaseamonkeyMatch2.12beta3
OR
mozillaseamonkeyMatch2.12beta4
OR
mozillaseamonkeyMatch2.12beta5
OR
mozillaseamonkeyMatch2.12beta6
OR
mozillaseamonkeyMatch2.12.1
OR
mozillaseamonkeyMatch2.13
OR
mozillaseamonkeyMatch2.13beta1
OR
mozillaseamonkeyMatch2.13beta2
OR
mozillaseamonkeyMatch2.13beta3
OR
mozillaseamonkeyMatch2.13beta4
OR
mozillaseamonkeyMatch2.13beta5
OR
mozillaseamonkeyMatch2.13beta6
OR
mozillaseamonkeyMatch2.13.1
OR
mozillaseamonkeyMatch2.13.2
OR
mozillaseamonkeyMatch2.14
OR
mozillaseamonkeyMatch2.14beta1
OR
mozillaseamonkeyMatch2.14beta2
OR
mozillaseamonkeyMatch2.14beta3
OR
mozillaseamonkeyMatch2.14beta4
OR
mozillaseamonkeyMatch2.14beta5
OR
mozillaseamonkeyMatch2.15
OR
mozillaseamonkeyMatch2.15beta1
OR
mozillaseamonkeyMatch2.15beta2
OR
mozillaseamonkeyMatch2.15beta3
OR
mozillaseamonkeyMatch2.15beta4
OR
mozillaseamonkeyMatch2.15beta5
OR
mozillaseamonkeyMatch2.15beta6
OR
mozillaseamonkeyMatch2.15.1
OR
mozillaseamonkeyMatch2.15.2
OR
mozillaseamonkeyMatch2.16
OR
mozillaseamonkeyMatch2.16beta1
OR
mozillaseamonkeyMatch2.16beta2
OR
mozillaseamonkeyMatch2.16beta3
OR
mozillaseamonkeyMatch2.16beta4
OR
mozillaseamonkeyMatch2.16beta5
OR
mozillaseamonkeyMatch2.16.1
OR
mozillaseamonkeyMatch2.16.2
OR
mozillaseamonkeyMatch2.17
OR
mozillaseamonkeyMatch2.17beta1
OR
mozillaseamonkeyMatch2.17beta2
OR
mozillaseamonkeyMatch2.17beta3
OR
mozillaseamonkeyMatch2.17beta4
OR
mozillaseamonkeyMatch2.17.1
OR
mozillaseamonkeyMatch2.18beta1
OR
mozillaseamonkeyMatch2.18beta2
OR
mozillaseamonkeyMatch2.18beta3
OR
mozillaseamonkeyMatch2.18beta4
OR
mozillaseamonkeyMatch2.19
OR
mozillaseamonkeyMatch2.19beta1
OR
mozillaseamonkeyMatch2.19beta2
OR
mozillaseamonkeyMatch2.20beta1
OR
mozillaseamonkeyMatch2.20beta2
OR
mozillaseamonkeyMatch2.20beta3
Node
mozillafirefox_esrMatch17.0
OR
mozillafirefox_esrMatch17.0.1
OR
mozillafirefox_esrMatch17.0.2
OR
mozillafirefox_esrMatch17.0.3
OR
mozillafirefox_esrMatch17.0.4
OR
mozillafirefox_esrMatch17.0.5
OR
mozillafirefox_esrMatch17.0.6
OR
mozillafirefox_esrMatch17.0.7
OR
mozillafirefox_esrMatch17.0.8
Node
mozillafirefoxRange23.0.1
OR
mozillafirefoxMatch19.0
OR
mozillafirefoxMatch19.0.1
OR
mozillafirefoxMatch19.0.2
OR
mozillafirefoxMatch20.0
OR
mozillafirefoxMatch20.0.1
OR
mozillafirefoxMatch21.0
OR
mozillafirefoxMatch22.0
OR
mozillafirefoxMatch23.0
Node
mozillathunderbirdRange17.0.9
OR
mozillathunderbirdMatch17.0
OR
mozillathunderbirdMatch17.0.1
OR
mozillathunderbirdMatch17.0.2
OR
mozillathunderbirdMatch17.0.3
OR
mozillathunderbirdMatch17.0.4
OR
mozillathunderbirdMatch17.0.5
OR
mozillathunderbirdMatch17.0.6
OR
mozillathunderbirdMatch17.0.7
OR
mozillathunderbirdMatch17.0.8
Node
mozillathunderbird_esrMatch17.0
OR
mozillathunderbird_esrMatch17.0.1
OR
mozillathunderbird_esrMatch17.0.2
OR
mozillathunderbird_esrMatch17.0.3
OR
mozillathunderbird_esrMatch17.0.4
OR
mozillathunderbird_esrMatch17.0.5
OR
mozillathunderbird_esrMatch17.0.6
OR
mozillathunderbird_esrMatch17.0.7
OR
mozillathunderbird_esrMatch17.0.8

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

Low

0.083 Low

EPSS

Percentile

94.4%