[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Security bypass vulnerability in Google Chrome, Mozilla products and Mono Framework via a crafted JPEG image (Mac OS X)

ID: oval:org.secpod.oval:def:16067Date: (C)2013-11-26   (M)2023-12-26
Class: VULNERABILITYFamily: macos




The host is installed with Mono Framework before 4.8.1, Google Chrome before 31.0.1650.48, Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2 or SeaMonkey before 2.23 and is prone to an information disclosure vulnerability. The flaw is present in get_sos function in jdmarker.c, which fails to properly handle the certain duplications of component data. Successful exploitation allows remote attackers to obtain sensitive information from uninitialized memory locations.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.13
Apple Mac OS X 10.8
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X 10.12
Apple Mac OS X Server 10.12
Apple Mac OS X Server 10.8
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Apple Mac OS X Server 10.11
Product:
Google Chrome
Mozilla Thunderbird
Mozilla SeaMonkey
Mozilla Firefox
Mozilla Firefox ESR
Mono Framework
Reference:
CVE-2013-6629
CVE    1
CVE-2013-6629
CPE    7
cpe:/o:apple:mac_os_x
cpe:/a:google:chrome
cpe:/a:mozilla:firefox_esr
cpe:/a:mozilla:thunderbird
...

© SecPod Technologies