9.3
CVSSv2

CVE-2013-1722

Published: 18/09/2013 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox prior to 24.0, Firefox ESR 17.x prior to 17.0.9, Thunderbird prior to 24.0, Thunderbird ESR 17.x prior to 17.0.9, and SeaMonkey prior to 2.21 allows remote malicious users to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla thunderbird 17.0.6

mozilla thunderbird 17.0.7

mozilla thunderbird 17.0

mozilla thunderbird 17.0.1

mozilla thunderbird 17.0.8

mozilla thunderbird

mozilla thunderbird 17.0.4

mozilla thunderbird 17.0.5

mozilla thunderbird 17.0.2

mozilla thunderbird 17.0.3

mozilla firefox 21.0

mozilla firefox 20.0.1

mozilla firefox 20.0

mozilla firefox

mozilla firefox 19.0.1

mozilla firefox 19.0

mozilla firefox 22.0

mozilla firefox 19.0.2

mozilla firefox 23.0

mozilla thunderbird esr 17.0.5

mozilla thunderbird esr 17.0.4

mozilla thunderbird esr 17.0.3

mozilla thunderbird esr 17.0.2

mozilla thunderbird esr 17.0.7

mozilla thunderbird esr 17.0.6

mozilla thunderbird esr 17.0.8

mozilla thunderbird esr 17.0.1

mozilla thunderbird esr 17.0

mozilla firefox esr 17.0.8

mozilla firefox esr 17.0.7

mozilla firefox esr 17.0.6

mozilla firefox esr 17.0.5

mozilla firefox esr 17.0.1

mozilla firefox esr 17.0

mozilla firefox esr 17.0.4

mozilla firefox esr 17.0.3

mozilla firefox esr 17.0.2

mozilla seamonkey 2.14

mozilla seamonkey 2.13.1

mozilla seamonkey 2.13

mozilla seamonkey 2.12

mozilla seamonkey 2.11

mozilla seamonkey 2.10

mozilla seamonkey 2.1

mozilla seamonkey 2.0.9

mozilla seamonkey 2.0.2

mozilla seamonkey 2.0.14

mozilla seamonkey 2.0

mozilla seamonkey 2.20

mozilla seamonkey

mozilla seamonkey 2.18

mozilla seamonkey 2.17.1

mozilla seamonkey 2.16.1

mozilla seamonkey 2.16

mozilla seamonkey 2.15

mozilla seamonkey 2.13.2

mozilla seamonkey 2.10.1

mozilla seamonkey 2.0.6

mozilla seamonkey 2.0.5

mozilla seamonkey 2.0.11

mozilla seamonkey 2.0.10

mozilla seamonkey 2.19

mozilla seamonkey 2.17

mozilla seamonkey 2.12.1

mozilla seamonkey 2.0.4

mozilla seamonkey 2.0.3

mozilla seamonkey 2.0.1

mozilla seamonkey 2.16.2

mozilla seamonkey 2.15.2

mozilla seamonkey 2.15.1

mozilla seamonkey 2.0.8

mozilla seamonkey 2.0.7

mozilla seamonkey 2.0.13

mozilla seamonkey 2.0.12

Vendor Advisories

Synopsis Critical: firefox security update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix several security issues are now availablefor Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having criticalsecurity impact Common Vulner ...
Synopsis Important: thunderbird security update Type/Severity Security Advisory: Important Topic An updated thunderbird package that fixes several security issues is nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingimportant security impact ...
Several security issues were fixed in Thunderbird ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows may lead to the execution of arbitrary code The Iceweasel version in the oldstable distribution (squeeze) is no longer supported with security updates For the stable distribution (wheezy), the ...
Mozilla Foundation Security Advisory 2013-79 Use-after-free in Animation Manager during stylesheet cloning Announced September 17, 2013 Reporter Abhishek Arya Impact Critical Products Firefox, Firefox ESR, SeaMonkey, Thunderb ...
Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 240, Firefox ESR 17x before 1709, Thunderbird before 240, Thunderbird ESR 17x before 1709, and SeaMonkey before 221 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory c ...