Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2013-1697 | First vendor Publication | 2013-06-25 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:16800 | |||
Oval ID: | oval:org.mitre.oval:def:16800 | ||
Title: | USN-1891-1 -- Thunderbird vulnerabilities | ||
Description: | Several security issues were fixed in Thunderbird. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1891-1 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 8 |
Platform(s): | Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 | Product(s): | thunderbird |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17243 | |||
Oval ID: | oval:org.mitre.oval:def:17243 | ||
Title: | The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method | ||
Description: | The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-1697 | Version: | 15 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19998 | |||
Oval ID: | oval:org.mitre.oval:def:19998 | ||
Title: | DSA-2720-1 icedove - several | ||
Description: | Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, use-after-free vulnerabilities, missing permission checks, incorrect memory handling and other implementation errors may lead to the execution of arbitrary code, privilege escalation, information disclosure or cross-site request forgery. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2720-1 CVE-2013-0795 CVE-2013-0801 CVE-2013-1670 CVE-2013-1674 CVE-2013-1675 CVE-2013-1676 CVE-2013-1677 CVE-2013-1678 CVE-2013-1679 CVE-2013-1680 CVE-2013-1681 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | icedove |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20086 | |||
Oval ID: | oval:org.mitre.oval:def:20086 | ||
Title: | DSA-2716-1 iceweasel - several | ||
Description: | Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, use-after-free vulnerabilities, missing permission checks, incorrect memory handling and other implementation errors may lead to the execution of arbitrary code, privilege escalation, information disclosure or cross-site request forgery. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2716-1 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | iceweasel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20691 | |||
Oval ID: | oval:org.mitre.oval:def:20691 | ||
Title: | RHSA-2013:0981: firefox security update (Critical) | ||
Description: | The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0981-00 CESA-2013:0981 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 143 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 CentOS Linux 5 CentOS Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20827 | |||
Oval ID: | oval:org.mitre.oval:def:20827 | ||
Title: | RHSA-2013:0982: thunderbird security update (Important) | ||
Description: | The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0982-00 CESA-2013:0982 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 143 |
Platform(s): | Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 5 CentOS Linux 5 CentOS Linux 6 | Product(s): | thunderbird |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23136 | |||
Oval ID: | oval:org.mitre.oval:def:23136 | ||
Title: | DEPRECATED: ELSA-2013:0982: thunderbird security update (Important) | ||
Description: | The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0982-00 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 46 |
Platform(s): | Oracle Linux 6 Oracle Linux 5 | Product(s): | thunderbird |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23392 | |||
Oval ID: | oval:org.mitre.oval:def:23392 | ||
Title: | DEPRECATED: ELSA-2013:0981: firefox security update (Critical) | ||
Description: | The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0981-00 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 46 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23481 | |||
Oval ID: | oval:org.mitre.oval:def:23481 | ||
Title: | ELSA-2013:0982: thunderbird security update (Important) | ||
Description: | The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0982-00 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 45 |
Platform(s): | Oracle Linux 6 Oracle Linux 5 | Product(s): | thunderbird |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23822 | |||
Oval ID: | oval:org.mitre.oval:def:23822 | ||
Title: | ELSA-2013:0981: firefox security update (Critical) | ||
Description: | The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0981-00 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 45 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25026 | |||
Oval ID: | oval:org.mitre.oval:def:25026 | ||
Title: | SUSE-SU-2013:1153-1 -- Security update for Mozilla Firefox | ||
Description: | Mozilla Firefox has been updated to the 17.0.7 ESR version, which fixes bugs and security issues. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:1153-1 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1697 | Version: | 5 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Server 10 SUSE Linux Enterprise Desktop 11 SUSE Linux Enterprise Desktop 10 | Product(s): | Mozilla Firefox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27536 | |||
Oval ID: | oval:org.mitre.oval:def:27536 | ||
Title: | DEPRECATED: ELSA-2013-0982 -- thunderbird security update (important) | ||
Description: | [17.0.7-1.0.1.el6_4] - Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js [17.0.7-1] - Update to 17.0.7 ESR | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0982 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 4 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | thunderbird |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27613 | |||
Oval ID: | oval:org.mitre.oval:def:27613 | ||
Title: | DEPRECATED: ELSA-2013-0981 -- firefox security update (critical) | ||
Description: | firefox [17.0.7-1.0.1.el6_4] - Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones [17.0.7-1] - Update to 17.0.7 ESR xulrunner [17.0.7-1.0.1.el6_4] - Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js - Removed XULRUNNER_VERSION from SOURCE21 [17.0.7-1] - Update to 17.0.7 ESR [17.0.6-5] - Added workaround for rhbz#973721 - fixing problem with installation of some addons [17.0.6-4] - Added a workaround for rhbz#961687 - Prelink throws message 'Cannot safely convert .rel.dyn' section from REL to RELA' [17.0.6-3] - Added patch for aliasing issues (mozbz#821502) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0981 CVE-2013-1682 CVE-2013-1684 CVE-2013-1685 CVE-2013-1686 CVE-2013-1687 CVE-2013-1690 CVE-2013-1692 CVE-2013-1693 CVE-2013-1694 CVE-2013-1697 | Version: | 4 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-574.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-556.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-555.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-554.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201309-23.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_firefox-20130628-130702.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2013-0982.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0981.nasl - Type : ACT_GATHER_INFO |
2013-07-07 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2720.nasl - Type : ACT_GATHER_INFO |
2013-07-06 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_firefox-20130628-8636.nasl - Type : ACT_GATHER_INFO |
2013-07-06 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_firefox-20130628-130628.nasl - Type : ACT_GATHER_INFO |
2013-07-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1890-2.nasl - Type : ACT_GATHER_INFO |
2013-06-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2716.nasl - Type : ACT_GATHER_INFO |
2013-06-27 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2013-0982.nasl - Type : ACT_GATHER_INFO |
2013-06-27 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_b3fcb387de4b11e2b1c60025905a4771.nasl - Type : ACT_GATHER_INFO |
2013-06-27 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1891-1.nasl - Type : ACT_GATHER_INFO |
2013-06-27 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0981.nasl - Type : ACT_GATHER_INFO |
2013-06-27 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1890-1.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130625_thunderbird_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Mac OS X host contains a web browser that is potentially affected ... File : macosx_firefox_17_0_7_esr.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Mac OS X host contains a mail client that is potentially affected ... File : macosx_thunderbird_17_0_7.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130625_firefox_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0982.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0981.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Mac OS X host contains a web browser that is potentially affected ... File : macosx_firefox_22.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Windows host contains a mail client that is potentially affected b... File : mozilla_thunderbird_1707_esr.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Windows host contains a mail client that is potentially affected b... File : mozilla_thunderbird_1707.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Windows host contains a web browser that is potentially affected b... File : mozilla_firefox_22.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Windows host contains a web browser that is potentially affected b... File : mozilla_firefox_1707_esr.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Mac OS X host contains a mail client that is potentially affected ... File : macosx_thunderbird_17_0_7_esr.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-02-07 01:24:17 |
|
2024-11-28 12:34:12 |
|
2024-11-01 01:22:58 |
|
2024-10-22 09:28:20 |
|
2024-10-21 17:28:27 |
|
2024-08-02 12:23:10 |
|
2024-08-02 01:06:51 |
|
2024-02-10 01:20:45 |
|
2024-02-02 01:22:30 |
|
2024-02-01 12:06:38 |
|
2023-09-05 12:21:16 |
|
2023-09-05 01:06:32 |
|
2023-09-02 12:21:17 |
|
2023-09-02 01:06:37 |
|
2023-08-22 12:18:59 |
|
2023-07-14 01:06:34 |
|
2023-03-28 12:06:41 |
|
2022-10-11 01:06:20 |
|
2021-05-04 12:24:29 |
|
2021-04-22 01:29:18 |
|
2020-10-14 01:09:14 |
|
2020-10-03 01:09:18 |
|
2020-05-29 01:08:32 |
|
2020-05-24 01:10:52 |
|
2020-05-23 00:36:37 |
|
2019-06-25 12:05:15 |
|
2019-01-31 12:01:38 |
|
2019-01-30 12:05:19 |
|
2018-06-29 12:01:42 |
|
2018-01-18 12:05:20 |
|
2017-11-22 12:05:18 |
|
2017-09-19 09:25:55 |
|
2017-01-07 09:25:11 |
|
2016-06-28 19:23:23 |
|
2016-04-26 22:59:44 |
|
2014-06-14 13:34:59 |
|
2014-02-17 11:18:10 |
|
2013-11-04 21:26:31 |
|
2013-08-22 17:19:50 |
|
2013-08-14 05:20:07 |
|
2013-07-03 13:26:52 |
|
2013-07-01 00:18:37 |
|
2013-06-26 21:19:03 |
|
2013-06-26 13:19:59 |
|