CVE Vulnerabilities

CVE-2013-1054

Improper Resource Shutdown or Release

Published: Apr 07, 2021 | Modified: Apr 19, 2021
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW

The unity-firefox-extension package could be tricked into destroying the Unity webapps context, causing Firefox to crash. This could be achieved by spinning the event loop inside the webapps initialization callback. Fixed in 3.0.0+14.04.20140416-0ubuntu1.14.04.1 by shipping an empty package, thus disabling the extension entirely.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

Name Vendor Start Version End Version
Unity-firefox-extension Canonical * 3.0.0+14.04.20140416-0ubuntu1.14.04.1 (excluding)
Unity-firefox-extension Ubuntu quantal *
Unity-firefox-extension Ubuntu raring *
Unity-firefox-extension Ubuntu saucy *
Unity-firefox-extension Ubuntu trusty *
Unity-firefox-extension Ubuntu vivid *

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References