The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html
lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html
lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html
rhn.redhat.com/errata/RHSA-2013-1476.html
rhn.redhat.com/errata/RHSA-2013-1480.html
www.debian.org/security/2013/dsa-2788
www.debian.org/security/2013/dsa-2797
www.mozilla.org/security/announce/2013/mfsa2013-96.html
www.securityfocus.com/bid/63421
bugzilla.mozilla.org/show_bug.cgi?id=916580
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18694
security.gentoo.org/glsa/201504-01