Vulnerability Details : CVE-2012-3967
The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2012-3967
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*When used together with: Linux » Linux Kernel
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*When used together with: Linux » Linux Kernel
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*When used together with: Linux » Linux Kernel
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*When used together with: Linux » Linux Kernel
- cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*When used together with: Linux » Linux Kernel
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
Threat overview for CVE-2012-3967
Top countries where our scanners detected CVE-2012-3967
Top open port discovered on systems with this issue
8200
IPs affected by CVE-2012-3967 341
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-3967!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-3967
0.89%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-3967
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2012-3967
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3967
-
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
[security-announce] SUSE-SU-2012:1167-1: important: Security update forMailing List;Third Party Advisory
-
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Third Party Advisory
-
http://www.ubuntu.com/usn/USN-1548-2
USN-1548-2: Firefox regression | Ubuntu security noticesThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2012-1211.html
RHSA-2012:1211 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.mozilla.org/security/announce/2012/mfsa2012-62.html
WebGL use-after-free and memory corruption — MozillaVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2012-1210.html
RHSA-2012:1210 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.ubuntu.com/usn/USN-1548-1
USN-1548-1: Firefox vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=777028
777028 - (CVE-2012-3967) stack scribbling with 4-byte values choosable among a few values, when using more than 16 sampler uniforms, on Mesa, with all driversExploit;Issue Tracking;Patch;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
[security-announce] openSUSE-SU-2012:1065-1: critical: MozillaFirefox: UMailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/55277
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3967 Memory Corruption VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
[security-announce] SUSE-SU-2012:1157-1: important: Security update forMailing List;Third Party Advisory
Jump to