CVE Reference: CVE-2014-1508

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2014-1508

Description:
The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.

CVE Status:
Candidate

References:

UBUNTU
  http://www.ubuntu.com/usn/USN-2151-1

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
  http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
  http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
  http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html

REDHAT
  http://rhn.redhat.com/errata/RHSA-2014-0316.html
  http://rhn.redhat.com/errata/RHSA-2014-0310.html

DEBIAN
  http://www.debian.org/security/2014/dsa-2881

CONFIRM
  http://www.mozilla.org/security/announce/2014/mfsa2014-26.html

BID
  66426


Return to the previous page.