Vulnerability Details : CVE-2013-1735
Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2013-1735
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:22.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:23.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:17.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird_esr:17.0.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-1735
6.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-1735
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2013-1735
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1735
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html
[SECURITY] Fedora 20 Update: firefox-24.0-1.fc20
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html
openSUSE-SU-2013:1493-1: moderate: update for MozillaFirefox
-
http://www.mozilla.org/security/announce/2013/mfsa2013-90.html
Memory corruption involving scrolling — MozillaVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1269.html
RHSA-2013:1269 - Security Advisory - Red Hat Customer Portal
-
http://www.ubuntu.com/usn/USN-1951-1
USN-1951-1: Firefox vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html
openSUSE-SU-2013:1499-1: moderate: Mozilla updates September 2013
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html
openSUSE-SU-2013:1496-1: moderate: update for xulrunner17
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html
[SECURITY] Fedora 18 Update: firefox-24.0-1.fc18
-
http://www.ubuntu.com/usn/USN-1952-1
USN-1952-1: Thunderbird vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html
openSUSE-SU-2013:1495-1: moderate: update for MozillaThunderbird
-
http://www.debian.org/security/2013/dsa-2762
Debian -- Security Information -- DSA-2762-1 icedove
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html
[SECURITY] Fedora 19 Update: firefox-24.0-1.fc19
-
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html
[security-announce] openSUSE-SU-2013:1633-1: important: Mozilla Suite: U
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html
openSUSE-SU-2013:1491-1: moderate: update for seamonkey
-
http://rhn.redhat.com/errata/RHSA-2013-1268.html
RHSA-2013:1268 - Security Advisory - Red Hat Customer Portal
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18443
Repository / Oval Repository
-
http://www.securityfocus.com/bid/62479
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1735 Remote Memory Corruption Vulnerability
-
https://bugzilla.mozilla.org/show_bug.cgi?id=898871
898871 - (CVE-2013-1735) ASAN heap-use-after-free in mozilla::layout::ScrollbarActivity
Jump to