Vulnerability Details : CVE-2014-1524
The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2014-1524
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1524
1.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1524
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2014-1524
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1524
-
http://www.securitytracker.com/id/1030164
Mozilla Seamonkey Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.mozilla.org/security/announce/2014/mfsa2014-38.html
Buffer overflow when using non-XBL object as XBL — MozillaVendor Advisory
-
http://www.debian.org/security/2014/dsa-2918
Debian -- Security Information -- DSA-2918-1 iceweaselThird Party Advisory
-
http://www.securitytracker.com/id/1030163
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks and Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/67131
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1524 Remote Memory Corruption VulnerabilityThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Oracle Solaris Bulletin - April 2016Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
openSUSE-SU-2014:0599-1: moderate: update for MozillaFirefoxMailing List;Third Party Advisory
-
http://www.debian.org/security/2014/dsa-2924
Debian -- Security Information -- DSA-2924-1 icedoveThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
openSUSE-SU-2014:0629-1: moderate: update for seamonkeyMailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
[SECURITY] Fedora 20 Update: thunderbird-24.5.0-1.fc20Mailing List;Third Party Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=989183
989183 - (CVE-2014-1524) Global-buffer-overflow in nsXBLProtoImpl::InstallImplementationExploit;Issue Tracking;Vendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
[SECURITY] Fedora 19 Update: firefox-29.0-5.fc19Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0448.html
RHSA-2014:0448 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201504-01
Mozilla Products: Multiple vulnerabilities (GLSA 201504-01) — Gentoo securityThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
openSUSE-SU-2014:0602-1: moderate: Mozilla updates 5/2014Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
[security-announce] SUSE-SU-2014:0727-1: important: Security update forMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
[security-announce] SUSE-SU-2014:0665-1: important: Security update forMailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2189-1
USN-2189-1: Thunderbird vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2185-1
USN-2185-1: Firefox vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
openSUSE-SU-2014:0640-1: moderate: update for MozillaThunderbirdMailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0449.html
RHSA-2014:0449 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securitytracker.com/id/1030165
Mozilla Thunderbird Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks and Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
Jump to