{
  "threat_severity" : "Critical",
  "public_date" : "2013-01-08T00:00:00Z",
  "bugzilla" : {
    "description" : "Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02)",
    "id" : "891822",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=891822"
  },
  "cvss" : {
    "cvss_base_score" : "6.8",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
    "status" : "draft"
  },
  "cwe" : "(CWE-416|CWE-119)",
  "details" : [ "Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas." ],
  "statement" : "Not Vulnerable. This issue does not affect the version of firefox and thunderbird as shipped with Red Hat Enterprise Linux 5 and 6",
  "acknowledgement" : "Red Hat would like to thank Mozilla project for reporting this issue.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "firefox",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "thunderbird",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "firefox",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "thunderbird",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-0763\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-0763\nhttp://www.mozilla.org/security/announce/2013/mfsa2013-02.html" ],
  "name" : "CVE-2013-0763",
  "csaw" : false
}