CVE-2014-1576

Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
http://rhn.redhat.com/errata/RHSA-2014-1635.html
http://secunia.com/advisories/61387
http://secunia.com/advisories/61854
http://secunia.com/advisories/62021
http://secunia.com/advisories/62022
http://secunia.com/advisories/62023
http://www.debian.org/security/2014/dsa-3050
http://www.debian.org/security/2014/dsa-3061
http://www.mozilla.org/security/announce/2014/mfsa2014-75.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.securityfocus.com/bid/70430
http://www.securitytracker.com/id/1031028
http://www.securitytracker.com/id/1031030
http://www.ubuntu.com/usn/USN-2372-1
http://www.ubuntu.com/usn/USN-2373-1
https://advisories.mageia.org/MGASA-2014-0421.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1041512
https://security.gentoo.org/glsa/201504-01
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html
http://rhn.redhat.com/errata/RHSA-2014-1635.html
http://secunia.com/advisories/61387
http://secunia.com/advisories/61854
http://secunia.com/advisories/62021
http://secunia.com/advisories/62022
http://secunia.com/advisories/62023
http://www.debian.org/security/2014/dsa-3050
http://www.debian.org/security/2014/dsa-3061
http://www.mozilla.org/security/announce/2014/mfsa2014-75.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.securityfocus.com/bid/70430
http://www.securitytracker.com/id/1031028
http://www.securitytracker.com/id/1031030
http://www.ubuntu.com/usn/USN-2372-1
http://www.ubuntu.com/usn/USN-2373-1
https://advisories.mageia.org/MGASA-2014-0421.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1041512
https://security.gentoo.org/glsa/201504-01
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html - () http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html - () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html -
References () http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html - () http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html -
References () http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html - () http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html -
References () http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html - () http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html -
References () http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html - () http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html -
References () http://rhn.redhat.com/errata/RHSA-2014-1635.html - () http://rhn.redhat.com/errata/RHSA-2014-1635.html -
References () http://secunia.com/advisories/61387 - () http://secunia.com/advisories/61387 -
References () http://secunia.com/advisories/61854 - () http://secunia.com/advisories/61854 -
References () http://secunia.com/advisories/62021 - () http://secunia.com/advisories/62021 -
References () http://secunia.com/advisories/62022 - () http://secunia.com/advisories/62022 -
References () http://secunia.com/advisories/62023 - () http://secunia.com/advisories/62023 -
References () http://www.debian.org/security/2014/dsa-3050 - () http://www.debian.org/security/2014/dsa-3050 -
References () http://www.debian.org/security/2014/dsa-3061 - () http://www.debian.org/security/2014/dsa-3061 -
References () http://www.mozilla.org/security/announce/2014/mfsa2014-75.html - Vendor Advisory () http://www.mozilla.org/security/announce/2014/mfsa2014-75.html - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html - () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -
References () http://www.securityfocus.com/bid/70430 - () http://www.securityfocus.com/bid/70430 -
References () http://www.securitytracker.com/id/1031028 - () http://www.securitytracker.com/id/1031028 -
References () http://www.securitytracker.com/id/1031030 - () http://www.securitytracker.com/id/1031030 -
References () http://www.ubuntu.com/usn/USN-2372-1 - () http://www.ubuntu.com/usn/USN-2372-1 -
References () http://www.ubuntu.com/usn/USN-2373-1 - () http://www.ubuntu.com/usn/USN-2373-1 -
References () https://advisories.mageia.org/MGASA-2014-0421.html - () https://advisories.mageia.org/MGASA-2014-0421.html -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1041512 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1041512 -
References () https://security.gentoo.org/glsa/201504-01 - () https://security.gentoo.org/glsa/201504-01 -

21 Oct 2024, 13:55

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*

Information

Published : 2014-10-15 10:55

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1576

Mitre link : CVE-2014-1576

CVE.ORG link : CVE-2014-1576


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer