TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2014-1486

CRITICAL
9.8

Beschreibung

Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht2/6/2014
Zuletzt geandert11/25/2025
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoramozilla:firefoxmozilla:seamonkeymozilla:thunderbirdopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationsuse:suse_linux_enterprise_desktopsuse:suse_linux_enterprise_serversuse:suse_linux_enterprise_software_development_kit

Schwachen (CWE)

CWE-416

Referenzen

http://osvdb.org/102872(security@mozilla.org)
http://download.novell.com/Download?buildid=VYQsgaFpQ2k(af854a3a-2127-422b-91ae-364da2661108)
http://download.novell.com/Download?buildid=Y2fux-JW1Qc(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/102872(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0132.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0133.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56706(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56761(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56763(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56767(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56787(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56858(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56888(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56922(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-2858(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/65334(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029717(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029720(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029721(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2102-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2102-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2119-1(af854a3a-2127-422b-91ae-364da2661108)
https://8pecxstudios.com/?page_id=44080(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=942164(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201504-01(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.