The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/59760 - | |
References | () http://secunia.com/advisories/60628 - | |
References | () http://www.mozilla.org/security/announce/2014/mfsa2014-57.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - | |
References | () http://www.securityfocus.com/bid/68820 - | |
References | () http://www.securitytracker.com/id/1030619 - | |
References | () http://www.securitytracker.com/id/1030620 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1020205 - | |
References | () https://security.gentoo.org/glsa/201504-01 - |
Information
Published : 2014-07-23 11:12
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1549
Mitre link : CVE-2014-1549
CVE.ORG link : CVE-2014-1549
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer