Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
2013-12-11T15:55:13.073
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | opensuse | opensuse | 12.2 | Yes |
Operating System | opensuse | opensuse | 13.1 | Yes |
Operating System | suse | linux_enterprise_desktop | 11 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |
Operating System | suse | linux_enterprise_software_development_kit | 11 | Yes |
Application | mozilla | firefox | < 26.0 | Yes |
Application | mozilla | seamonkey | < 2.23 | Yes |
Operating System | canonical | ubuntu_linux | 12.04 | Yes |
Operating System | canonical | ubuntu_linux | 12.10 | Yes |
Operating System | canonical | ubuntu_linux | 13.04 | Yes |
Operating System | canonical | ubuntu_linux | 13.10 | Yes |
Operating System | fedoraproject | fedora | 19 | Yes |
Operating System | fedoraproject | fedora | 20 | Yes |
Operating System | oracle | solaris | 11.3 | Yes |