Vulnerability Details : CVE-2014-1524
The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-1524
Probability of exploitation activity in the next 30 days: 1.47%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-1524
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
[email protected] |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
[email protected] |
CWE ids for CVE-2014-1524
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: [email protected] (Primary)
References for CVE-2014-1524
-
http://www.securitytracker.com/id/1030164
Third Party Advisory;VDB Entry
-
http://www.mozilla.org/security/announce/2014/mfsa2014-38.html
Vendor Advisory
-
http://www.debian.org/security/2014/dsa-2918
Third Party Advisory
-
http://www.securitytracker.com/id/1030163
Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/67131
Third Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
Mailing List;Third Party Advisory
-
http://www.debian.org/security/2014/dsa-2924
Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
Mailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
Mailing List;Third Party Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=989183
Exploit;Issue Tracking;Vendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0448.html
Third Party Advisory
-
https://security.gentoo.org/glsa/201504-01
Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
Mailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2189-1
Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2185-1
Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0449.html
Third Party Advisory
-
http://www.securitytracker.com/id/1030165
Third Party Advisory;VDB Entry
Products affected by CVE-2014-1524
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*