Rapid7 Vulnerability & Exploit Database

MFSA2012-63 Thunderbird: SVG buffer overflow and use-after-free issues (CVE-2012-3969)

Back to Search

MFSA2012-63 Thunderbird: SVG buffer overflow and use-after-free issues (CVE-2012-3969)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
08/29/2012
Created
07/25/2018
Added
08/30/2012
Modified
04/05/2017

Description

Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.

Solution(s)

  • mozilla-thunderbird-esr-upgrade-10_0_7
  • mozilla-thunderbird-upgrade-15_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;