Vulnerability Details : CVE-2014-1531
Potential exploit
Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2014-1531
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1531
1.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1531
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2014-1531
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1531
-
http://www.securitytracker.com/id/1030164
Mozilla Seamonkey Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.debian.org/security/2014/dsa-2918
Debian -- Security Information -- DSA-2918-1 iceweaselThird Party Advisory
-
http://www.securitytracker.com/id/1030163
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks and Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Oracle Solaris Bulletin - April 2016Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
openSUSE-SU-2014:0599-1: moderate: update for MozillaFirefoxMailing List;Third Party Advisory
-
http://www.debian.org/security/2014/dsa-2924
Debian -- Security Information -- DSA-2924-1 icedoveThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
openSUSE-SU-2014:0629-1: moderate: update for seamonkeyMailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
[SECURITY] Fedora 20 Update: thunderbird-24.5.0-1.fc20Mailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
[SECURITY] Fedora 19 Update: firefox-29.0-5.fc19Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/67134
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1531 Use After Free Memory Corruption VulnerabilityThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2014-0448.html
RHSA-2014:0448 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201504-01
Mozilla Products: Multiple vulnerabilities (GLSA 201504-01) — Gentoo securityThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
openSUSE-SU-2014:0602-1: moderate: Mozilla updates 5/2014Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
[security-announce] SUSE-SU-2014:0727-1: important: Security update forMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
[security-announce] SUSE-SU-2014:0665-1: important: Security update forMailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2189-1
USN-2189-1: Thunderbird vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=987140
987140 - (CVE-2014-1531) ASAN heap-use-after-free in nsGenericHTMLElement::GetWidthHeightForImageExploit;Issue Tracking;Vendor Advisory
-
http://www.ubuntu.com/usn/USN-2185-1
USN-2185-1: Firefox vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.mozilla.org/security/announce/2014/mfsa2014-44.html
Use-after-free in imgLoader while resizing images — MozillaVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
openSUSE-SU-2014:0640-1: moderate: update for MozillaThunderbirdMailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0449.html
RHSA-2014:0449 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securitytracker.com/id/1030165
Mozilla Thunderbird Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks and Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
Jump to