CVE-2014-1514

vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mozillaCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
VendorProductVersion
mozillafirefox
𝑥
< 28.0
mozillafirefox_esr
24.0 ≤
𝑥
< 24.4
mozillaseamonkey
𝑥
< 2.25
mozillathunderbird
𝑥
< 24.4
debiandebian_linux
7.0
debiandebian_linux
8.0
susesuse_linux_enterprise_software_development_kit
11.0:sp3
opensuseopensuse
11.4
opensuseopensuse
12.3
opensuseopensuse
13.1
redhatenterprise_linux_desktop
5.0
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_eus
6.5
redhatenterprise_linux_server
5.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server_aus
6.5
redhatenterprise_linux_server_eus
6.5
redhatenterprise_linux_server_tus
6.5
redhatenterprise_linux_workstation
5.0
redhatenterprise_linux_workstation
6.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
canonicalubuntu_linux
13.10
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
firefox
saucy
Fixed 28.0+build2-0ubuntu0.13.10.1
released
quantal
Fixed 28.0+build2-0ubuntu0.12.10.1
released
precise
Fixed 28.0+build2-0ubuntu0.12.04.1
released
lucid
ignored
thunderbird
saucy
Fixed 1:24.4.0+build1-0ubuntu0.13.10.2
released
quantal
Fixed 1:24.4.0+build1-0ubuntu0.12.10.1
released
precise
Fixed 1:24.4.0+build1-0ubuntu0.12.04.1
released
lucid
ignored
References