TROYANOSYVIRUS
Voltar para CVEs

CVE-2014-1486

CRITICAL
9.8

Descricao

Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/6/2014
Ultima modificacao11/25/2025
Fontenvd
Avistamentos honeypot0

Produtos afetados

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoramozilla:firefoxmozilla:seamonkeymozilla:thunderbirdopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationsuse:suse_linux_enterprise_desktopsuse:suse_linux_enterprise_serversuse:suse_linux_enterprise_software_development_kit

Fraquezas (CWE)

CWE-416

Referencias

http://osvdb.org/102872(security@mozilla.org)
http://download.novell.com/Download?buildid=VYQsgaFpQ2k(af854a3a-2127-422b-91ae-364da2661108)
http://download.novell.com/Download?buildid=Y2fux-JW1Qc(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/102872(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0132.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0133.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56706(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56761(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56763(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56767(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56787(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56858(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56888(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/56922(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-2858(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/65334(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029717(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029720(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029721(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2102-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2102-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2119-1(af854a3a-2127-422b-91ae-364da2661108)
https://8pecxstudios.com/?page_id=44080(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=942164(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201504-01(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.