The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
https://security.gentoo.org/glsa/201504-01
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18694
https://bugzilla.mozilla.org/show_bug.cgi?id=916580
http://www.securityfocus.com/bid/63421
http://www.mozilla.org/security/announce/2013/mfsa2013-96.html
http://www.debian.org/security/2013/dsa-2797
http://www.debian.org/security/2013/dsa-2788
http://rhn.redhat.com/errata/RHSA-2013-1480.html
http://rhn.redhat.com/errata/RHSA-2013-1476.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html