Red Hat Customer Portal

Skip to main content

CVE-2013-5600

Impact:
Critical
Public Date:
2013-10-29
CWE:
CWE-416
Bugzilla:
1023843: CVE-2013-5599 CVE-2013-5600 CVE-2013-5601 Mozilla: Miscellaneous use-after-free issues found through ASAN fuzzing (MFSA 2013-100)

The MITRE CVE dictionary describes this issue as:

Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.

Find out more about CVE-2013-5600 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 6.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (firefox) RHSA-2013:1476 2013-10-29
Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server) (thunderbird) RHSA-2013:1480 2013-10-30
Red Hat Enterprise Linux 6 (thunderbird) RHSA-2013:1480 2013-10-30
Red Hat Enterprise Linux 5 (firefox) RHSA-2013:1476 2013-10-29
Red Hat Enterprise Linux 5 (thunderbird) RHSA-2013:1480 2013-10-30

Affected Packages State

Platform Package State
Red Hat Enterprise Linux version 6 xulrunner 17.0.10-1.el6_4 Fixed
Red Hat Enterprise Linux version 5 xulrunner 17.0.10-1.el5_10 Fixed

Acknowledgements

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Nils as the original reporter.

External References

Last Modified