Security bypass vulnerability in Google Chrome, Mozilla products and Mono Framework via a crafted JPEG image (Mac OS X)ID: oval:org.secpod.oval:def:16067 | Date: (C)2013-11-26 (M)2023-12-26 |
Class: VULNERABILITY | Family: macos |
The host is installed with Mono Framework before 4.8.1, Google Chrome before 31.0.1650.48, Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2 or SeaMonkey before 2.23 and is prone to an information disclosure vulnerability. The flaw is present in get_sos function in jdmarker.c, which fails to properly handle the certain duplications of component data. Successful exploitation allows remote attackers to obtain sensitive information from uninitialized memory locations.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Apple Mac OS X Server 10.12 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X Server 10.10 |
Apple Mac OS X Server 10.11 |
Product: |
Google Chrome |
Mozilla Thunderbird |
Mozilla SeaMonkey |
Mozilla Firefox |
Mozilla Firefox ESR |
Mono Framework |