Vulnerability CVE-2014-1576


Published: 2014-10-15

Description:
Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Mozilla -> Firefox 
Mozilla -> Firefox esr 
Mozilla -> Thunderbird 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
http://rhn.redhat.com/errata/RHSA-2014-1635.html
http://www.debian.org/security/2014/dsa-3050
http://www.debian.org/security/2014/dsa-3061
http://www.mozilla.org/security/announce/2014/mfsa2014-75.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.securityfocus.com/bid/70430
http://www.securitytracker.com/id/1031028
http://www.securitytracker.com/id/1031030
http://www.ubuntu.com/usn/USN-2372-1
http://www.ubuntu.com/usn/USN-2373-1
https://advisories.mageia.org/MGASA-2014-0421.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1041512
https://security.gentoo.org/glsa/201504-01

Copyright 2024, cxsecurity.com

 

Back to Top