Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18789
https://bugzilla.mozilla.org/show_bug.cgi?id=907727
http://www.ubuntu.com/usn/USN-1952-1
http://www.ubuntu.com/usn/USN-1951-1
http://www.securityfocus.com/bid/62475
http://www.mozilla.org/security/announce/2013/mfsa2013-91.html
http://www.debian.org/security/2013/dsa-2762
http://rhn.redhat.com/errata/RHSA-2013-1269.html
http://rhn.redhat.com/errata/RHSA-2013-1268.html
http://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html
http://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html
http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html
http://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html
http://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html