← Volver a CVEs
CVE-2012-0459
N/ADescripcion
The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via dynamic modification of a keyframe followed by access to the cssText of the keyframe.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado3/14/2012
Ultima modificacion4/29/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
mozilla:firefoxmozilla:firefox_esrmozilla:seamonkeymozilla:thunderbirdmozilla:thunderbird_esr
Debilidades (CWE)
CWE-264
Referencias
http://rhn.redhat.com/errata/RHSA-2012-0387.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2012-0388.html(cve@mitre.org)
http://secunia.com/advisories/48359(cve@mitre.org)
http://secunia.com/advisories/48402(cve@mitre.org)
http://secunia.com/advisories/48496(cve@mitre.org)
http://secunia.com/advisories/48513(cve@mitre.org)
http://secunia.com/advisories/48553(cve@mitre.org)
http://secunia.com/advisories/48561(cve@mitre.org)
http://secunia.com/advisories/48629(cve@mitre.org)
http://secunia.com/advisories/49055(cve@mitre.org)
http://www.securitytracker.com/id?1026801(cve@mitre.org)
http://www.securitytracker.com/id?1026803(cve@mitre.org)
http://www.securitytracker.com/id?1026804(cve@mitre.org)
http://www.ubuntu.com/usn/USN-1400-1(cve@mitre.org)
http://www.ubuntu.com/usn/USN-1400-2(cve@mitre.org)
http://www.ubuntu.com/usn/USN-1400-3(cve@mitre.org)
http://www.ubuntu.com/usn/USN-1400-4(cve@mitre.org)
http://www.ubuntu.com/usn/USN-1400-5(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=723446(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15066(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-0387.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-0388.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48359(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48402(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48496(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48513(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48553(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48561(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48629(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/49055(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2012:032(af854a3a-2127-422b-91ae-364da2661108)
http://www.mozilla.org/security/announce/2012/mfsa2012-17.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1026801(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1026803(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1026804(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1400-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1400-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1400-3(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1400-4(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1400-5(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=723446(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15066(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.