Lucene search

K
nvd[email protected]NVD:CVE-2012-1947
HistoryJun 05, 2012 - 11:55 p.m.

CVE-2012-1947

2012-06-0523:55:01
CWE-119
web.nvd.nist.gov
1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.137 Low

EPSS

Percentile

95.6%

Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.

Affected configurations

NVD
Node
mozillafirefoxMatch4.0
OR
mozillafirefoxMatch4.0beta1
OR
mozillafirefoxMatch4.0beta10
OR
mozillafirefoxMatch4.0beta11
OR
mozillafirefoxMatch4.0beta12
OR
mozillafirefoxMatch4.0beta2
OR
mozillafirefoxMatch4.0beta3
OR
mozillafirefoxMatch4.0beta4
OR
mozillafirefoxMatch4.0beta5
OR
mozillafirefoxMatch4.0beta6
OR
mozillafirefoxMatch4.0beta7
OR
mozillafirefoxMatch4.0beta8
OR
mozillafirefoxMatch4.0beta9
OR
mozillafirefoxMatch4.0.1
OR
mozillafirefoxMatch5.0
OR
mozillafirefoxMatch5.0.1
OR
mozillafirefoxMatch6.0
OR
mozillafirefoxMatch6.0.1
OR
mozillafirefoxMatch6.0.2
OR
mozillafirefoxMatch7.0
OR
mozillafirefoxMatch7.0.1
OR
mozillafirefoxMatch8.0
OR
mozillafirefoxMatch8.0.1
OR
mozillafirefoxMatch9.0
OR
mozillafirefoxMatch9.0.1
OR
mozillafirefoxMatch10.0
OR
mozillafirefoxMatch10.0.1
OR
mozillafirefoxMatch10.0.2
OR
mozillafirefoxMatch11.0
OR
mozillafirefoxMatch12.0
OR
mozillafirefoxMatch12.0beta6
OR
mozillafirefox_esrMatch10.0
OR
mozillafirefox_esrMatch10.0.1
OR
mozillafirefox_esrMatch10.0.2
OR
mozillafirefox_esrMatch10.0.3
OR
mozillafirefox_esrMatch10.0.4
OR
mozillaseamonkeyRange2.9
OR
mozillaseamonkeyMatch1.0
OR
mozillaseamonkeyMatch1.0alpha
OR
mozillaseamonkeyMatch1.0beta
OR
mozillaseamonkeyMatch1.0.1
OR
mozillaseamonkeyMatch1.0.2
OR
mozillaseamonkeyMatch1.0.3
OR
mozillaseamonkeyMatch1.0.4
OR
mozillaseamonkeyMatch1.0.5
OR
mozillaseamonkeyMatch1.0.6
OR
mozillaseamonkeyMatch1.0.7
OR
mozillaseamonkeyMatch1.0.8
OR
mozillaseamonkeyMatch1.0.9
OR
mozillaseamonkeyMatch1.1
OR
mozillaseamonkeyMatch1.1alpha
OR
mozillaseamonkeyMatch1.1beta
OR
mozillaseamonkeyMatch1.1.1
OR
mozillaseamonkeyMatch1.1.2
OR
mozillaseamonkeyMatch1.1.3
OR
mozillaseamonkeyMatch1.1.4
OR
mozillaseamonkeyMatch1.1.5
OR
mozillaseamonkeyMatch1.1.6
OR
mozillaseamonkeyMatch1.1.7
OR
mozillaseamonkeyMatch1.1.8
OR
mozillaseamonkeyMatch1.1.9
OR
mozillaseamonkeyMatch1.1.10
OR
mozillaseamonkeyMatch1.1.11
OR
mozillaseamonkeyMatch1.1.12
OR
mozillaseamonkeyMatch1.1.13
OR
mozillaseamonkeyMatch1.1.14
OR
mozillaseamonkeyMatch1.1.15
OR
mozillaseamonkeyMatch1.1.16
OR
mozillaseamonkeyMatch1.1.17
OR
mozillaseamonkeyMatch1.1.18
OR
mozillaseamonkeyMatch1.1.19
OR
mozillaseamonkeyMatch1.5.0.8
OR
mozillaseamonkeyMatch1.5.0.9
OR
mozillaseamonkeyMatch1.5.0.10
OR
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0rc2
OR
mozillaseamonkeyMatch2.0.1
OR
mozillaseamonkeyMatch2.0.2
OR
mozillaseamonkeyMatch2.0.3
OR
mozillaseamonkeyMatch2.0.4
OR
mozillaseamonkeyMatch2.0.5
OR
mozillaseamonkeyMatch2.0.6
OR
mozillaseamonkeyMatch2.0.7
OR
mozillaseamonkeyMatch2.0.8
OR
mozillaseamonkeyMatch2.0.9
OR
mozillaseamonkeyMatch2.0.10
OR
mozillaseamonkeyMatch2.0.11
OR
mozillaseamonkeyMatch2.0.12
OR
mozillaseamonkeyMatch2.0.13
OR
mozillaseamonkeyMatch2.0.14
OR
mozillaseamonkeyMatch2.1
OR
mozillaseamonkeyMatch2.1alpha1
OR
mozillaseamonkeyMatch2.1alpha2
OR
mozillaseamonkeyMatch2.1alpha3
OR
mozillaseamonkeyMatch2.1beta1
OR
mozillaseamonkeyMatch2.1beta2
OR
mozillaseamonkeyMatch2.1beta3
OR
mozillaseamonkeyMatch2.1rc1
OR
mozillaseamonkeyMatch2.1rc2
OR
mozillaseamonkeyMatch2.2
OR
mozillaseamonkeyMatch2.2beta1
OR
mozillaseamonkeyMatch2.2beta2
OR
mozillaseamonkeyMatch2.2beta3
OR
mozillaseamonkeyMatch2.3
OR
mozillaseamonkeyMatch2.3beta1
OR
mozillaseamonkeyMatch2.3beta2
OR
mozillaseamonkeyMatch2.3beta3
OR
mozillaseamonkeyMatch2.3.1
OR
mozillaseamonkeyMatch2.3.2
OR
mozillaseamonkeyMatch2.3.3
OR
mozillaseamonkeyMatch2.4
OR
mozillaseamonkeyMatch2.4beta1
OR
mozillaseamonkeyMatch2.4beta2
OR
mozillaseamonkeyMatch2.4beta3
OR
mozillaseamonkeyMatch2.4.1
OR
mozillaseamonkeyMatch2.5
OR
mozillaseamonkeyMatch2.5beta1
OR
mozillaseamonkeyMatch2.5beta2
OR
mozillaseamonkeyMatch2.5beta3
OR
mozillaseamonkeyMatch2.5beta4
OR
mozillaseamonkeyMatch2.6
OR
mozillaseamonkeyMatch2.6beta1
OR
mozillaseamonkeyMatch2.6beta2
OR
mozillaseamonkeyMatch2.6beta3
OR
mozillaseamonkeyMatch2.6beta4
OR
mozillaseamonkeyMatch2.6.1
OR
mozillaseamonkeyMatch2.7
OR
mozillaseamonkeyMatch2.7beta1
OR
mozillaseamonkeyMatch2.7beta2
OR
mozillaseamonkeyMatch2.7beta3
OR
mozillaseamonkeyMatch2.7beta4
OR
mozillaseamonkeyMatch2.7beta5
OR
mozillaseamonkeyMatch2.7.1
OR
mozillaseamonkeyMatch2.7.2
OR
mozillaseamonkeyMatch2.8
OR
mozillaseamonkeyMatch2.8beta1
OR
mozillaseamonkeyMatch2.8beta2
OR
mozillaseamonkeyMatch2.8beta3
OR
mozillaseamonkeyMatch2.8beta4
OR
mozillaseamonkeyMatch2.8beta5
OR
mozillaseamonkeyMatch2.8beta6
OR
mozillaseamonkeyMatch2.9beta1
OR
mozillaseamonkeyMatch2.9beta2
OR
mozillaseamonkeyMatch2.9beta3
OR
mozillathunderbirdMatch5.0
OR
mozillathunderbirdMatch6.0
OR
mozillathunderbirdMatch6.0.1
OR
mozillathunderbirdMatch6.0.2
OR
mozillathunderbirdMatch7.0
OR
mozillathunderbirdMatch7.0.1
OR
mozillathunderbirdMatch8.0
OR
mozillathunderbirdMatch9.0
OR
mozillathunderbirdMatch9.0.1
OR
mozillathunderbirdMatch10.0
OR
mozillathunderbirdMatch10.0.1
OR
mozillathunderbirdMatch10.0.2
OR
mozillathunderbirdMatch10.0.3
OR
mozillathunderbirdMatch10.0.4
OR
mozillathunderbirdMatch11.0
OR
mozillathunderbirdMatch12.0
OR
mozillathunderbird_esrMatch10.0
OR
mozillathunderbird_esrMatch10.0.1
OR
mozillathunderbird_esrMatch10.0.2
OR
mozillathunderbird_esrMatch10.0.3
OR
mozillathunderbird_esrMatch10.0.4

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.137 Low

EPSS

Percentile

95.6%