Vulnerability Details : CVE-2013-1683
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2013-1683
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-1683
1.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-1683
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2013-1683
-
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html
[security-announce] openSUSE-SU-2013:1140-1: important: regular updates
-
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html
[security-announce] openSUSE-SU-2013:1142-1: important: MozillaFirefox:
-
http://www.mozilla.org/security/announce/2013/mfsa2013-49.html
Miscellaneous memory safety hazards (rv:22.0 / rv:17.0.7) — MozillaVendor Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=863454
863454 - crash in doInvoke @ XPCCallContext::Init
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17173
Repository / Oval Repository
-
http://www.ubuntu.com/usn/USN-1890-1
USN-1890-1: Firefox vulnerabilities | Ubuntu security notices
-
https://bugzilla.mozilla.org/show_bug.cgi?id=851418
851418 - "Assertion failure: XPCJSRuntime::Get()->GetJSContextStack()->Peek() == cx"
-
https://bugzilla.mozilla.org/show_bug.cgi?id=834732
834732 - Do a better job of maintaining the JS context stack
-
https://bugzilla.mozilla.org/show_bug.cgi?id=876458
876458 - IonMonkey: Assertion failure: str, at ./dist/include/js/Value.h:640 or Assertion failure: hasBase(), at vm/String.h:948 or Crash on Heap or Crash [@ StringMatch]
-
https://bugzilla.mozilla.org/show_bug.cgi?id=865569
865569 - Poison nsView
-
https://bugzilla.mozilla.org/show_bug.cgi?id=865883
865883 - IonMonkey: Assertion failure: Assertion failure: JSVAL_IS_DOUBLE_IMPL(l), at ./dist/include/js/Value.h:363
-
https://bugzilla.mozilla.org/show_bug.cgi?id=862182
862182 - Use refcounting when holding on to MediaResource* pointers
-
https://bugzilla.mozilla.org/show_bug.cgi?id=877287
877287 - Assertion failure: !cx->compartment->activeAnalysis, at jsinterp.cpp:365 or Crash [@ js::ion::CodeGenerator::link] with Proxy
-
https://bugzilla.mozilla.org/show_bug.cgi?id=846615
846615 - Valgrind warning about use after free in SocketAcceptTask
-
https://bugzilla.mozilla.org/show_bug.cgi?id=822941
822941 - IonMonkey: Valgrind detects "Conditional jump or move depends on uninitialised value(s)" with js::detail::BumpChunk::new or js::LifoAlloc::getOrCreateChunk on the stack
Jump to