8.4 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.174 Low
EPSS
Percentile
96.0%
Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.
lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
rhn.redhat.com/errata/RHSA-2012-1210.html
rhn.redhat.com/errata/RHSA-2012-1211.html
www.debian.org/security/2012/dsa-2553
www.debian.org/security/2012/dsa-2554
www.debian.org/security/2012/dsa-2556
www.mozilla.org/security/announce/2012/mfsa2012-63.html
www.securityfocus.com/bid/55292
www.ubuntu.com/usn/USN-1548-1
www.ubuntu.com/usn/USN-1548-2
www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
bugzilla.mozilla.org/show_bug.cgi?id=782141
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16635