Unrated severityNVD Advisory· Published Nov 21, 2012· Updated Apr 29, 2026
CVE-2012-4212
CVE-2012-4212
Description
Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Affected products
17cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*+ 2 more
- cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
19- lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2012-11/msg00090.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2012-11/msg00092.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2012-11/msg00093.htmlnvdMailing ListThird Party Advisory
- www.mozilla.org/security/announce/2012/mfsa2012-105.htmlnvdVendor Advisory
- www.securityfocus.com/bid/56630nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1636-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1638-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1638-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1638-3nvdThird Party Advisory
- bugzilla.mozilla.org/show_bug.cginvdIssue TrackingVendor Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15993nvdThird Party Advisory
- secunia.com/advisories/51369nvdBroken Link
- secunia.com/advisories/51370nvdBroken Link
- secunia.com/advisories/51381nvdBroken Link
- secunia.com/advisories/51434nvdBroken Link
- secunia.com/advisories/51439nvdBroken Link
- secunia.com/advisories/51440nvdBroken Link
News mentions
0No linked articles in our index yet.