Vulnerability Details : CVE-2014-1575
Potential exploit
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2014-1575
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1575
1.99%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1575
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-1575
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1575
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1020034
1020034 - TypedArray::WrapIntoNewCompartment is broken
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
[SECURITY] Fedora 20 Update: firefox-33.0-1.fc20
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
[SECURITY] Fedora 21 Update: firefox-33.0-1.fc21
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1018916
1018916 - Assertion failure: IsObjectValueInCompartment(value, compartment())
-
http://secunia.com/advisories/62023
Sign in
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1034230
1034230 - [cairo] Potential use of uninitialized |stack| in cairo_type1_font_subset_look_for_seac
-
http://www.securitytracker.com/id/1031028
Mozilla Firefox Bugs Let Remote Users Execute Arbitrary Code, Bypass Same Origin-Policy, and Obtain Potentially Sensitive Information - SecurityTracker
-
http://www.securityfocus.com/bid/70439
Mozilla Firefox/Thunderbird CVE-2014-1575 Multiple Memory Corruption Vulnerabilities
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1023035
1023035 - Assertion failure: CurrentThreadCanAccessRuntime(rt), at /js/src/jsgc.cpp:2141Exploit
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Oracle Solaris Bulletin - April 2016
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1032208
1032208 - Assertion failure: v.isObject(), at json.cpp:508 or Crash [@ GetObjectClass] or Crash [@ js::ObjectClassIs] with Symbol and JSON
-
http://secunia.com/advisories/62022
Sign in
-
https://security.gentoo.org/glsa/201504-01
Mozilla Products: Multiple vulnerabilities (GLSA 201504-01) — Gentoo security
-
http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
openSUSE-SU-2014:1344-1: moderate: update for firefox, mozilla-nspr, moz
-
http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
openSUSE-SU-2014:1345-1: moderate: update for firefox, mozilla-nspr, moz
-
http://www.ubuntu.com/usn/USN-2372-1
USN-2372-1: Firefox vulnerabilities | Ubuntu security notices
-
http://www.securitytracker.com/id/1031030
Mozilla Thunderbird Bugs Let Remote Users Execute Arbitrary Code - SecurityTracker
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1001994
1001994 - crash in libsystem_kernel.dylib@0x15866 on printing with position: sticky
-
http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
Miscellaneous memory safety hazards (rv:33.0 / rv:31.2) — MozillaVendor Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1033020
1033020 - Make BaslineFrame::returnValue match InterpreterFrame::returnValue
Jump to