CVE-2014-1513
19.03.2014, 10:55
TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 𝑥 < 28.0 |
mozilla | firefox_esr | 24.0 ≤ 𝑥 < 24.4 |
mozilla | seamonkey | 𝑥 < 2.25 |
mozilla | thunderbird | 𝑥 < 24.4 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
suse | suse_linux_enterprise_software_development_kit | 11.0:sp3 |
opensuse | opensuse | 11.4 |
opensuse | opensuse | 12.3 |
opensuse | opensuse | 13.1 |
redhat | enterprise_linux_desktop | 5.0 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_eus | 6.5 |
redhat | enterprise_linux_server | 5.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server_aus | 6.5 |
redhat | enterprise_linux_server_eus | 6.5 |
redhat | enterprise_linux_server_tus | 6.5 |
redhat | enterprise_linux_workstation | 5.0 |
redhat | enterprise_linux_workstation | 6.0 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 12.10 |
canonical | ubuntu_linux | 13.10 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||
---|---|---|---|---|---|---|---|---|---|
firefox |
| ||||||||
thunderbird |
|
Common Weakness Enumeration
References