CVE-2013-1591

Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:palemoon:pale_moon:*:*:*:*:*:*:*:*

History

15 Feb 2024, 21:08

Type Values Removed Values Added
References () http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f - Exploit, Patch () http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f - Mailing List, Patch
References () http://rhn.redhat.com/errata/RHSA-2013-0687.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2013-0687.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0746.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2013-0746.html - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:116 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:116 - Broken Link
References () http://www.palemoon.org/releasenotes-ng.shtml - () http://www.palemoon.org/releasenotes-ng.shtml - Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=910149 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=910149 - Exploit, Issue Tracking, Patch
References () https://support.f5.com/csp/article/K51392553 - () https://support.f5.com/csp/article/K51392553 - Third Party Advisory
References () https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077 - () https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077 - Third Party Advisory
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8
CWE CWE-189 CWE-190
CPE cpe:2.3:a:palemoon:pale_moon:12.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:9.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:15.3.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:15.2:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:12.0:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:15.2.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:12.2:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:15.3:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:4.0:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:5.0:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:7.0:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:15.0:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:6.0:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:12.3:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:9.0:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:15.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:15.1.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:12.3:r2:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:9.2:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:12.2.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:palemoon:pale_moon:11.0:*:*:*:*:*:*:*

Information

Published : 2013-01-31 23:55

Updated : 2024-02-15 21:08


NVD link : CVE-2013-1591

Mitre link : CVE-2013-1591

CVE.ORG link : CVE-2013-1591


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • enterprise_virtualization

palemoon

  • pale_moon
CWE
CWE-190

Integer Overflow or Wraparound