TROYANOSYVIRUS
Retour aux CVEs

CVE-2014-1486

CRITICAL
9.8

Description

Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie2/6/2014
Derniere modification11/25/2025
Sourcenvd
Observations honeypot0

Produits affectes

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoramozilla:firefoxmozilla:seamonkeymozilla:thunderbirdopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationsuse:suse_linux_enterprise_desktopsuse:suse_linux_enterprise_serversuse:suse_linux_enterprise_software_development_kit

Faiblesses (CWE)

CWE-416

References

http://osvdb.org/102872(security@mozilla.org)
http://download.novell.com/Download?buildid=VYQsgaFpQ2k(af854a3a-2127-422b-91ae-364da2661108)
http://download.novell.com/Download?buildid=Y2fux-JW1Qc(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/102872(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0132.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0133.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56706(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56761(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56763(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56767(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56787(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56858(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56888(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56922(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-2858(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/65334(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029717(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029720(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029721(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2102-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2102-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2119-1(af854a3a-2127-422b-91ae-364da2661108)
https://8pecxstudios.com/?page_id=44080(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=942164(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201504-01(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.