CVE-2013-0800
Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
Published
2013-04-03T11:56:21.293
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 6.8 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
8.6
Impact Score
6.4
Weaknesses
-
Type: Primary
NVD-CWE-Other
Affected Vendors & Products
References
-
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html
Mailing List, Third Party Advisory
([email protected])
-
http://rhn.redhat.com/errata/RHSA-2013-0696.html
Broken Link
([email protected])
-
http://rhn.redhat.com/errata/RHSA-2013-0697.html
Broken Link
([email protected])
-
http://www.debian.org/security/2013/dsa-2699
Third Party Advisory
([email protected])
-
http://www.mozilla.org/security/announce/2013/mfsa2013-31.html
Vendor Advisory
([email protected])
-
http://www.ubuntu.com/usn/USN-1791-1
Third Party Advisory
([email protected])
-
https://bugzilla.mozilla.org/show_bug.cgi?id=825721
Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16909
Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://rhn.redhat.com/errata/RHSA-2013-0696.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://rhn.redhat.com/errata/RHSA-2013-0697.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2013/dsa-2699
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.mozilla.org/security/announce/2013/mfsa2013-31.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.ubuntu.com/usn/USN-1791-1
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.mozilla.org/show_bug.cgi?id=825721
Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16909
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)