CVE Reference: CVE-2014-1513

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2014-1513

Description:
TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.

CVE Status:
Candidate

References:

UBUNTU
  http://www.ubuntu.com/usn/USN-2151-1

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
  http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
  http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
  http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html

REDHAT
  http://rhn.redhat.com/errata/RHSA-2014-0316.html
  http://rhn.redhat.com/errata/RHSA-2014-0310.html

DEBIAN
  http://www.debian.org/security/2014/dsa-2881

CONFIRM
  http://www.mozilla.org/security/announce/2014/mfsa2014-31.html

BID
  66203


Return to the previous page.