TROYANOSYVIRUS
Back to CVEs

CVE-2014-1486

CRITICAL
9.8

Description

Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/6/2014
Last Modified11/25/2025
Sourcenvd
Honeypot Sightings0

Affected Products

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoramozilla:firefoxmozilla:seamonkeymozilla:thunderbirdopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationsuse:suse_linux_enterprise_desktopsuse:suse_linux_enterprise_serversuse:suse_linux_enterprise_software_development_kit

Weaknesses (CWE)

CWE-416

References

http://osvdb.org/102872(security@mozilla.org)
http://download.novell.com/Download?buildid=VYQsgaFpQ2k(af854a3a-2127-422b-91ae-364da2661108)
http://download.novell.com/Download?buildid=Y2fux-JW1Qc(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/102872(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0132.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0133.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56706(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56761(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56763(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56767(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56787(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56858(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56888(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56922(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-2858(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/65334(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029717(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029720(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029721(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2102-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2102-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2119-1(af854a3a-2127-422b-91ae-364da2661108)
https://8pecxstudios.com/?page_id=44080(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=942164(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201504-01(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.