Vulnerabilidad en Mozilla Firefox (CVE-2012-1948)
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/07/2012
Última modificación:
11/04/2025
Descripción
Múltiples vulnerabilidades no especificadas en el motor del navegador de Mozilla Firefox v4.x a v13.0, Firefox ESR v10.x antes de v10.0.6, Thunderbird v5.0 a v13.0, Thunderbird ESR v10.x antes de v10.0.6, y SeaMonkey antes de v2.11 permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria y caída de la aplicación) o posiblemente ejecutar código de su elección a través de vectores desconocidos.<br />
Impacto
Puntuación base 2.0
9.30
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html
- http://osvdb.org/84007
- http://rhn.redhat.com/errata/RHSA-2012-1088.html
- http://secunia.com/advisories/49963
- http://secunia.com/advisories/49964
- http://secunia.com/advisories/49965
- http://secunia.com/advisories/49968
- http://secunia.com/advisories/49972
- http://secunia.com/advisories/49977
- http://secunia.com/advisories/49979
- http://secunia.com/advisories/49992
- http://secunia.com/advisories/49993
- http://secunia.com/advisories/49994
- http://www.debian.org/security/2012/dsa-2514
- http://www.debian.org/security/2012/dsa-2528
- http://www.mozilla.org/security/announce/2012/mfsa2012-42.html
- http://www.securityfocus.com/bid/54580
- http://www.securitytracker.com/id?1027256=
- http://www.securitytracker.com/id?1027257=
- http://www.securitytracker.com/id?1027258=
- http://www.ubuntu.com/usn/USN-1509-1
- http://www.ubuntu.com/usn/USN-1509-2
- http://www.ubuntu.com/usn/USN-1510-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=732233
- https://bugzilla.mozilla.org/show_bug.cgi?id=746103
- https://bugzilla.mozilla.org/show_bug.cgi?id=746896
- https://bugzilla.mozilla.org/show_bug.cgi?id=749385
- https://bugzilla.mozilla.org/show_bug.cgi?id=750575
- https://bugzilla.mozilla.org/show_bug.cgi?id=754989
- https://bugzilla.mozilla.org/show_bug.cgi?id=756600
- https://bugzilla.mozilla.org/show_bug.cgi?id=758471
- https://bugzilla.mozilla.org/show_bug.cgi?id=763225
- https://bugzilla.mozilla.org/show_bug.cgi?id=772282
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16744
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html
- http://osvdb.org/84007
- http://rhn.redhat.com/errata/RHSA-2012-1088.html
- http://secunia.com/advisories/49963
- http://secunia.com/advisories/49964
- http://secunia.com/advisories/49965
- http://secunia.com/advisories/49968
- http://secunia.com/advisories/49972
- http://secunia.com/advisories/49977
- http://secunia.com/advisories/49979
- http://secunia.com/advisories/49992
- http://secunia.com/advisories/49993
- http://secunia.com/advisories/49994
- http://www.debian.org/security/2012/dsa-2514
- http://www.debian.org/security/2012/dsa-2528
- http://www.mozilla.org/security/announce/2012/mfsa2012-42.html
- http://www.securityfocus.com/bid/54580
- http://www.securitytracker.com/id?1027256=
- http://www.securitytracker.com/id?1027257=
- http://www.securitytracker.com/id?1027258=
- http://www.ubuntu.com/usn/USN-1509-1
- http://www.ubuntu.com/usn/USN-1509-2
- http://www.ubuntu.com/usn/USN-1510-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=732233
- https://bugzilla.mozilla.org/show_bug.cgi?id=746103
- https://bugzilla.mozilla.org/show_bug.cgi?id=746896
- https://bugzilla.mozilla.org/show_bug.cgi?id=749385
- https://bugzilla.mozilla.org/show_bug.cgi?id=750575
- https://bugzilla.mozilla.org/show_bug.cgi?id=754989
- https://bugzilla.mozilla.org/show_bug.cgi?id=756600
- https://bugzilla.mozilla.org/show_bug.cgi?id=758471
- https://bugzilla.mozilla.org/show_bug.cgi?id=763225
- https://bugzilla.mozilla.org/show_bug.cgi?id=772282
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16744