CVE-2013-0764

EUVD-2013-0775
The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 80%
Affected Products (NVD)
VendorProductVersion
mozillafirefox
𝑥
< 17.0.3
mozillafirefox
𝑥
< 19.0
mozillaseamonkey
𝑥
< 2.16
mozillathunderbird
𝑥
< 17.0.3
mozillathunderbird_esr
𝑥
< 17.0.3
opensuseopensuse
11.4
opensuseopensuse
12.1
opensuseopensuse
12.2
canonicalubuntu_linux
10.04
canonicalubuntu_linux
11.10
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
firefox
hardy
ignored
lucid
Fixed 18.0+build1-0ubuntu0.10.04.3
released
oneiric
Fixed 18.0+build1-0ubuntu0.11.10.3
released
precise
Fixed 18.0+build1-0ubuntu0.12.04.3
released
quantal
Fixed 18.0+build1-0ubuntu0.12.10.3
released
raring
Fixed 19.0~b1+build2-0ubuntu1
released
saucy
Fixed 19.0~b1+build2-0ubuntu1
released
seamonkey
hardy
ignored
lucid
ignored
oneiric
ignored
precise
dne
quantal
dne
raring
dne
saucy
dne
thunderbird
hardy
ignored
lucid
Fixed 17.0.2+build1-0ubuntu0.10.04.1
released
oneiric
Fixed 17.0.2+build1-0ubuntu0.11.10.1
released
precise
Fixed 17.0.2+build1-0ubuntu0.12.04.1
released
quantal
Fixed 17.0.2+build1-0ubuntu0.12.10.1
released
raring
Fixed 17.0.2+build1-0ubuntu1
released
saucy
Fixed 17.0.2+build1-0ubuntu1
released