CVE-2013-1690
KEV
🔴 Łataj teraz
Błąd w Firefox i Thunderbird umożliwia zdalne wykonanie kodu lub awarię aplikacji.
CVSS
8.8
EPSS
47.1%
Exploit
weaponized
Vendor
suse
Opis źródłowy (NVD)
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
dos
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 47.1% |
| Opublikowano (NVD) | 2013-06-26 03:19:10 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 16:42:18 UTC |
Referencje
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html (security@mozilla.org) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html (security@mozilla.org) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html (security@mozilla.org) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html (security@mozilla.org) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html (security@mozilla.org) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html (security@mozilla.org) [Mailing List, Third Party Advisory]
- http://rhn.redhat.com/errata/RHSA-2013-0981.html (security@mozilla.org) [Third Party Advisory]
- http://rhn.redhat.com/errata/RHSA-2013-0982.html (security@mozilla.org) [Third Party Advisory]
- http://www.debian.org/security/2013/dsa-2716 (security@mozilla.org) [Mailing List, Third Party Advisory]
- http://www.debian.org/security/2013/dsa-2720 (security@mozilla.org) [Mailing List, Third Party Advisory]
- http://www.mozilla.org/security/announce/2013/mfsa2013-53.html (security@mozilla.org) [Vendor Advisory]
- http://www.securityfocus.com/bid/60778 (security@mozilla.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.ubuntu.com/usn/USN-1890-1 (security@mozilla.org) [Third Party Advisory]
- http://www.ubuntu.com/usn/USN-1891-1 (security@mozilla.org) [Third Party Advisory]
- https://bugzilla.mozilla.org/show_bug.cgi?id=857883 (security@mozilla.org) [Issue Tracking]
- https://bugzilla.mozilla.org/show_bug.cgi?id=901365 (security@mozilla.org) [Issue Tracking]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16996 (security@mozilla.org) [Broken Link]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-1690 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]