Vulnerability Details : CVE-2013-1730
Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2013-1730
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:22.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:23.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-1730
1.00%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-1730
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2013-1730
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1730
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html
[SECURITY] Fedora 20 Update: firefox-24.0-1.fc20
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html
openSUSE-SU-2013:1493-1: moderate: update for MozillaFirefox
-
http://rhn.redhat.com/errata/RHSA-2013-1269.html
RHSA-2013:1269 - Security Advisory - Red Hat Customer Portal
-
http://www.ubuntu.com/usn/USN-1951-1
USN-1951-1: Firefox vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html
openSUSE-SU-2013:1499-1: moderate: Mozilla updates September 2013
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html
openSUSE-SU-2013:1496-1: moderate: update for xulrunner17
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html
[SECURITY] Fedora 18 Update: firefox-24.0-1.fc18
-
http://www.ubuntu.com/usn/USN-1952-1
USN-1952-1: Thunderbird vulnerabilities | Ubuntu security notices
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19022
Repository / Oval Repository
-
http://www.securityfocus.com/bid/62473
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1730 Remote Code Execution Vulnerability
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html
openSUSE-SU-2013:1495-1: moderate: update for MozillaThunderbird
-
http://www.debian.org/security/2013/dsa-2762
Debian -- Security Information -- DSA-2762-1 icedove
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html
[SECURITY] Fedora 19 Update: firefox-24.0-1.fc19
-
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html
[security-announce] openSUSE-SU-2013:1633-1: important: Mozilla Suite: U
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html
openSUSE-SU-2013:1491-1: moderate: update for seamonkey
-
http://rhn.redhat.com/errata/RHSA-2013-1268.html
RHSA-2013:1268 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.mozilla.org/show_bug.cgi?id=851353
851353 - (CVE-2013-1730) compartment mismatch in nsXBLBinding::DoInitJSClass
-
http://www.mozilla.org/security/announce/2013/mfsa2013-88.html
Compartment mismatch re-attaching XBL-backed nodes — MozillaVendor Advisory
Jump to