Critical severity9.8NVD Advisory· Published Dec 11, 2013· Updated Apr 29, 2026
CVE-2013-5618
CVE-2013-5618
Description
Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
Affected products
27- cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*+ 1 more
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- bugzilla.mozilla.org/show_bug.cginvdExploitIssue TrackingVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2013-12/msg00085.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2013-12/msg00086.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2013-12/msg00087.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2013-12/msg00119.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2013-12/msg00120.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2013-12/msg00121.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-01/msg00002.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2013-1812.htmlnvdThird Party Advisory
- www.mozilla.org/security/announce/2013/mfsa2013-109.htmlnvdVendor Advisory
- www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlnvdThird Party Advisory
- www.securitytracker.com/id/1029470nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1029476nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2052-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2053-1nvdThird Party Advisory
- security.gentoo.org/glsa/201504-01nvdThird Party Advisory
News mentions
0No linked articles in our index yet.