CVE编号
CVE-2012-4191利用情况
暂无补丁情况
官方补丁披露时间
2012-10-12漏洞描述
Mozilla Firefox/SeaMonkey/Thunderbird是Mozilla所发布的WEB浏览器/新闻组客户端/邮件客户端。Mozilla Firefox/SeaMonkey/Thunderbird mozilla::net::FailDelayManager::Lookup函数存在一个内存破坏漏洞,允许攻击者构建恶意WEB页,诱使用户解析,可使应用程序崩溃或以应用程序上下文执行任意代码。解决建议
Mozilla Firefox 16.0.1, Thunderbird 16.0.1, SeaMonkey 2.13.1已经修复此漏洞,建议用户下载使用:http://www.mozilla.com/en-US/
参考链接 |
|
---|---|
http://osvdb.org/86125 | |
http://secunia.com/advisories/50904 | |
http://secunia.com/advisories/50929 | |
http://secunia.com/advisories/50984 | |
http://www.mozilla.org/security/announce/2012/mfsa2012-88.html | |
http://www.securitytracker.com/id?1027653 | |
http://www.ubuntu.com/usn/USN-1608-1 | |
http://www.ubuntu.com/usn/USN-1611-1 | |
https://bugzilla.mozilla.org/show_bug.cgi?id=798045 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79209 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | mozilla | firefox | * |
Up to (excluding) 16.0.1 |
|||||
运行在以下环境 | |||||||||
应用 | mozilla | seamonkey | * |
Up to (excluding) 2.13.1 |
|||||
运行在以下环境 | |||||||||
应用 | mozilla | thunderbird | * |
Up to (excluding) 16.0.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_11.4 | libfreebl3-debuginfo-32bit | * |
Up to (excluding) 24.8.0-127.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_11.4 | mozilla-nss-certs | * |
Up to (excluding) 24.8.0-127.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_11.4 | mozilla-nss-debuginfo-32bit | * |
Up to (excluding) 24.8.0-127.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_11.4 | mozilla-nss-sysinit-32bit | * |
Up to (excluding) 24.8.0-127.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_11.4 | mozilla-nss-sysinit-debuginfo | * |
Up to (excluding) 24.8.0-127.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.1 | libfreebl3-debuginfo-32bit | * |
Up to (excluding) 16.0.1-2.46.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.1 | mozilla-nss-certs | * |
Up to (excluding) 16.0.1-2.46.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.1 | mozilla-nss-debuginfo-32bit | * |
Up to (excluding) 16.0.1-2.46.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.1 | mozilla-nss-sysinit-32bit | * |
Up to (excluding) 16.0.1-2.46.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.1 | mozilla-nss-sysinit-debuginfo | * |
Up to (excluding) 16.0.1-2.46.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.2 | libfreebl3-debuginfo-32bit | * |
Up to (excluding) 16.0.1-2.17.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.2 | mozilla-nss-certs | * |
Up to (excluding) 16.0.1-2.17.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.2 | mozilla-nss-debuginfo-32bit | * |
Up to (excluding) 16.0.1-2.17.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.2 | mozilla-nss-sysinit-32bit | * |
Up to (excluding) 16.0.1-2.17.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_12.2 | mozilla-nss-sysinit-debuginfo | * |
Up to (excluding) 16.0.1-2.17.1 |
|||||
- 攻击路径 本地
- 攻击复杂度 困难
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 -
还没有评论,来说两句吧...