Search for vulnerabilities
Vulnerability details: VCID-sfaj-2cgp-aaap
Vulnerability ID VCID-sfaj-2cgp-aaap
Aliases CVE-2012-4187
Summary CVE-2012-4185 CVE-2012-4186 CVE-2012-4187 CVE-2012-4188 Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86)
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Critical https://access.redhat.com/errata/RHSA-2012:1350
rhas Critical https://access.redhat.com/errata/RHSA-2012:1351
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.01953 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.02705 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04019 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04135 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.04843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.07438 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.24843 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.26671 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.26671 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.27838 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
epss 0.27838 https://api.first.org/data/v1/epss?cve=CVE-2012-4187
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=863626
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2012-4187
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2012-86
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
http://rhn.redhat.com/errata/RHSA-2012-1351.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4187.json
https://api.first.org/data/v1/epss?cve=CVE-2012-4187
https://bugzilla.mozilla.org/show_bug.cgi?id=787493
http://secunia.com/advisories/50856
http://secunia.com/advisories/50892
http://secunia.com/advisories/50904
http://secunia.com/advisories/50935
http://secunia.com/advisories/50936
http://secunia.com/advisories/50984
http://secunia.com/advisories/55318
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16425
http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
http://www.mozilla.org/security/announce/2012/mfsa2012-86.html
http://www.securityfocus.com/bid/56125
http://www.ubuntu.com/usn/USN-1611-1
863626 https://bugzilla.redhat.com/show_bug.cgi?id=863626
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_sdk:10:sp4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:10:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
CVE-2012-4187 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187
CVE-2012-4187 https://nvd.nist.gov/vuln/detail/CVE-2012-4187
GLSA-201301-01 https://security.gentoo.org/glsa/201301-01
mfsa2012-86 https://www.mozilla.org/en-US/security/advisories/mfsa2012-86
RHSA-2012:1350 https://access.redhat.com/errata/RHSA-2012:1350
RHSA-2012:1351 https://access.redhat.com/errata/RHSA-2012:1351
USN-1600-1 https://usn.ubuntu.com/1600-1/
USN-1611-1 https://usn.ubuntu.com/1611-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2012-4187
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.81848
EPSS Score 0.01953
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.