Vulnerability Details : CVE-2014-1544
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2014-1544
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1544
3.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1544
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2014-1544
-
http://www.debian.org/security/2014/dsa-2986
Debian -- Security Information -- DSA-2986-1 iceweasel
-
http://www.securityfocus.com/bid/68816
Mozilla Firefox/Thunderbird CVE-2014-1544 Use After Free Memory Corruption Vulnerability
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Oracle Solaris Bulletin - April 2016
-
http://www.debian.org/security/2014/dsa-2996
Debian -- Security Information -- DSA-2996-1 icedove
-
http://secunia.com/advisories/59591
Sign in
-
http://secunia.com/advisories/59760
-
https://bugzilla.mozilla.org/show_bug.cgi?id=963150
963150 - (CVE-2014-1544) heap-use-after-free in libnss3.so!CERT_DestroyCertificate
-
https://security.gentoo.org/glsa/201504-01
Mozilla Products: Multiple vulnerabilities (GLSA 201504-01) — Gentoo security
-
http://www.mozilla.org/security/announce/2014/mfsa2014-63.html
Use-after-free while when manipulating certificates in the trusted cache — MozillaVendor Advisory
-
http://secunia.com/advisories/59719
Sign in
-
http://www.securitytracker.com/id/1030617
Mozilla Firefox Race Condition in libnss CERT_DestroyCertificate() Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://secunia.com/advisories/60486
Sign in
-
http://secunia.com/advisories/60628
Sign in
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Oracle VM Server for x86 Bulletin - July 2016
-
http://secunia.com/advisories/60621
Sign in
-
http://secunia.com/advisories/60083
Sign in
Jump to