CVE Vulnerabilities

CVE-2013-0764

Inadequate Encryption Strength

Published: Jan 13, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
5.1 IMPORTANT
AV:N/AC:H/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*17.0.3 (excluding)
FirefoxMozilla*19.0 (excluding)
SeamonkeyMozilla*2.16 (excluding)
ThunderbirdMozilla*17.0.3 (excluding)
Thunderbird_esrMozilla*17.0.3 (excluding)
FirefoxUbuntudevel*
FirefoxUbuntuhardy*
FirefoxUbuntulucid*
FirefoxUbuntuoneiric*
FirefoxUbuntuprecise*
FirefoxUbuntuquantal*
FirefoxUbunturaring*
FirefoxUbuntusaucy*
FirefoxUbuntuupstream*
SeamonkeyUbuntuhardy*
SeamonkeyUbuntulucid*
SeamonkeyUbuntuoneiric*
SeamonkeyUbuntuupstream*
ThunderbirdUbuntudevel*
ThunderbirdUbuntuhardy*
ThunderbirdUbuntulucid*
ThunderbirdUbuntuoneiric*
ThunderbirdUbuntuprecise*
ThunderbirdUbuntuquantal*
ThunderbirdUbunturaring*
ThunderbirdUbuntusaucy*
ThunderbirdUbuntuupstream*

Potential Mitigations

References