mozilla thunderbird-esr CVE-2013-1690 vulnerability in Mozilla and Other Products
Published on June 26, 2013

product logo product logo product logo product logo product logo product logo product logo product logo
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.

Vendor Advisory Vendor Advisory NVD

Known Exploited Vulnerability

This Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Mozilla Firefox and Thunderbird do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial-of-service or possibly execute arbitrary code via a crafted web site.

The following remediation steps are recommended / required by April 18, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2013-1690 is exploitable with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2013-1690 has been classified to as a Buffer Overflow vulnerability or weakness.


Products Associated with CVE-2013-1690

You can be notified by stack.watch whenever vulnerabilities like CVE-2013-1690 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

What versions are vulnerable to CVE-2013-1690?