ID CVE-2014-1541
Summary Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
References
Vulnerable Configurations
  • Mozilla Thunderbird 24.0
    cpe:2.3:a:mozilla:thunderbird:24.0
  • Mozilla Thunderbird 24.0.1
    cpe:2.3:a:mozilla:thunderbird:24.0.1
  • Mozilla Thunderbird 24.1
    cpe:2.3:a:mozilla:thunderbird:24.1
  • Mozilla Thunderbird 24.1.1
    cpe:2.3:a:mozilla:thunderbird:24.1.1
  • Mozilla Thunderbird 24.2
    cpe:2.3:a:mozilla:thunderbird:24.2
  • Mozilla Thunderbird 24.3
    cpe:2.3:a:mozilla:thunderbird:24.3
  • Mozilla Thunderbird 24.4
    cpe:2.3:a:mozilla:thunderbird:24.4
  • Mozilla Thunderbird 24.5
    cpe:2.3:a:mozilla:thunderbird:24.5
  • Mozilla Firefox 29.0.1
    cpe:2.3:a:mozilla:firefox:29.0.1
  • Mozilla Firefox Extended Support Release (ESR) 24.0
    cpe:2.3:a:mozilla:firefox_esr:24.0
  • Mozilla Firefox Extended Support Release (ESR) 24.0.1
    cpe:2.3:a:mozilla:firefox_esr:24.0.1
  • Mozilla Firefox Extended Support Release (ESR) 24.0.2
    cpe:2.3:a:mozilla:firefox_esr:24.0.2
  • Mozilla Firefox Extended Support Release (ESR) 24.1.0
    cpe:2.3:a:mozilla:firefox_esr:24.1.0
  • Mozilla Firefox Extended Support Release (ESR) 24.1.1
    cpe:2.3:a:mozilla:firefox_esr:24.1.1
  • Mozilla Firefox Extended Support Release (ESR) 24.2
    cpe:2.3:a:mozilla:firefox_esr:24.2
  • Mozilla Firefox Extended Support Release (ESR) 24.3
    cpe:2.3:a:mozilla:firefox_esr:24.3
  • Mozilla Firefox Extended Support Release (ESR) 24.4
    cpe:2.3:a:mozilla:firefox_esr:24.4
  • Mozilla Firefox Extended Support Release (ESR) 24.5
    cpe:2.3:a:mozilla:firefox_esr:24.5
CVSS
Base: 10.0 (as of 11-06-2014 - 13:31)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2014-432.NASL
    description mozilla-nspr was updated to version 4.10.6 to fix one security issue : - OOB write with sprintf and console functions (CVE-2014-1545) MozillaFirefox was updated to version 30.0 to fix eight security issues : - Miscellaneous memory safety hazards (CVE-2014-1533/CVE-2014-1534) - Use-after-free and out of bounds issues found using Address Sanitizer (CVE-2014-1536/CVE-2014-1537/CVE-2014-1538) - Use-after-free in Event Listener Manager (CVE-2014-1540) - Use-after-free with SMIL Animation Controller (CVE-2014-1541) - Buffer overflow in Web Audio Speex resampler (CVE-2014-1542) Several non-security bugs were also fixed in this release.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 76181
    published 2014-06-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76181
    title openSUSE Security Update : MozillaFirefox / mozilla-nspr (openSUSE-SU-2014:0819-1)
  • NASL family Windows
    NASL id MOZILLA_THUNDERBIRD_24_6.NASL
    description The version of Thunderbird installed on the remote host is a version prior to 24.6 and is, therefore, affected by the following vulnerabilities : - Memory issues exist that could lead to arbitrary code execution. (CVE-2014-1533, CVE-2014-1534) - An out-of-bounds read issue exists in 'PropertyProvider::FindJustificationRange'. (CVE-2014-1536) - Use-after-free memory issues exist in 'mozilla::dom::workers::WorkerPrivateParent', 'nsTextEditRules::CreateMozBR', and the SMIL Animation Controller that could lead to code execution. (CVE-2014-1537, CVE-2014-1538, CVE-2014-1541)
    last seen 2019-02-21
    modified 2014-07-26
    plugin id 74441
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74441
    title Mozilla Thunderbird < 24.6 Multiple Vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2955.NASL
    description Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors and buffer overflows may lead to the execution of arbitrary code or denial of service.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74476
    published 2014-06-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74476
    title Debian DSA-2955-1 : iceweasel - security update
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2243-1.NASL
    description Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de Mooij, Ryan VanderMeulen, Jeff Walden, Kyle Huey, Jesse Ruderman, Gregor Wagner, Benoit Jacob and Karl Tomlinson discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2014-1533, CVE-2014-1534) Abhishek Arya discovered multiple use-after-free and out-of-bounds read issues in Firefox. An attacker could potentially exploit these to cause a denial of service via application crash or execute arbitrary code with the priviliges of the user invoking Firefox. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538) Tyson Smith and Jesse Schwartzentruber discovered a use-after-free in the event listener manager. An attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the priviliges of the user invoking Firefox. (CVE-2014-1540) A use-after-free was discovered in the SMIL animation controller. An attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the priviliges of the user invoking Firefox. (CVE-2014-1541) Holger Fuhrmannek discovered a buffer overflow in Web Audio. An attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the priviliges of the user invoking Firefox. (CVE-2014-1542). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 74493
    published 2014-06-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74493
    title Ubuntu 12.04 LTS / 13.10 / 14.04 LTS : firefox vulnerabilities (USN-2243-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2960.NASL
    description Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client: multiple memory safety errors and buffer overflows may lead to the execution of arbitrary code or denial of service.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 76081
    published 2014-06-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76081
    title Debian DSA-2960-1 : icedove - security update
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_FIREFOX_24_6_ESR.NASL
    description The version of Firefox ESR 24.x installed on the remote Mac OS X host is prior to 24.6 and is, therefore, affected by the following vulnerabilities : - A memory issue exists that could lead to arbitrary code execution. Note that this issue only affects Firefox ESR 24.5. (CVE-2014-1533) - Use-after-free memory issues exist in 'nsTextEditRules::CreateMozBR' and the SMIL Animation Controller that could lead to code execution. (CVE-2014-1538, CVE-2014-1541)
    last seen 2019-02-21
    modified 2014-10-15
    plugin id 74436
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74436
    title Firefox ESR 24.x < 24.6 Multiple Vulnerabilities (Mac OS X)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20140610_FIREFOX_ON_SL5_X.NASL
    description Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) After installing the update, Firefox must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 74488
    published 2014-06-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74488
    title Scientific Linux Security Update : firefox on SL5.x, SL6.x i386/x86_64
  • NASL family Windows
    NASL id MOZILLA_FIREFOX_24_6_ESR.NASL
    description The version of Firefox ESR 24.x installed on the remote host is prior to 24.6. It is, therefore, affected by the following vulnerabilities : - A memory issue exists that could lead to arbitrary code execution. Note that this issue only affects Firefox ESR 24.5. (CVE-2014-1533) - Use-after-free memory issues exist in 'nsTextEditRules::CreateMozBR' and the SMIL Animation Controller that could lead to code execution. (CVE-2014-1538, CVE-2014-1541)
    last seen 2019-02-21
    modified 2014-10-15
    plugin id 74439
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74439
    title Firefox ESR 24.x < 24.6 Multiple Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_FIREFOX_30.NASL
    description The version of Firefox installed on the remote Mac OS X host is a version prior to version 30.0. It is, therefore, affected by multiple vulnerabilities : - Memory issues exist that could lead to arbitrary code execution. Note that these issues only affect Firefox 29. (CVE-2014-1533, CVE-2014-1534) - An out-of-bounds read issue exists in 'PropertyProvider::FindJustificationRange'. (CVE-2014-1536) - Use-after-free memory issues exist in 'mozilla::dom::workers::WorkerPrivateParent', 'nsTextEditRules::CreateMozBR', and the SMIL Animation Controller that could lead to code execution. (CVE-2014-1537, CVE-2014-1538, CVE-2014-1541) - An issue exists when the cursor is used on an embedded Flash object which can make the cursor invisible and lead to clickjacking attacks. (CVE-2014-1539) - A use-after-free memory issue exists in the event listener manager. Note that this issue only affects Firefox 29. (CVE-2014-1540) - A buffer overflow issue exists in the Speex resampler for Web Audio that could lead to code execution. (CVE-2014-1542)
    last seen 2019-02-21
    modified 2016-04-28
    plugin id 74437
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74437
    title Firefox < 30.0 Multiple Vulnerabilities (Mac OS X)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2014-0741.NASL
    description From Red Hat Security Advisory 2014:0741 : Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de Mooij, Ryan VanderMeulen, Jeff Walden, Kyle Huey, Abhishek Arya, and Nils as the original reporters of these issues. For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 24.6.0 ESR. You can find a link to the Mozilla advisories in the References section of this erratum. All Firefox users should upgrade to these updated packages, which contain Firefox version 24.6.0 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2015-12-01
    plugin id 74455
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74455
    title Oracle Linux 5 / 6 / 7 : firefox (ELSA-2014-0741)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_888A0262F0D911E3BA0CB4B52FCE4CE8.NASL
    description The Mozilla Project reports : MFSA 2014-48 Miscellaneous memory safety hazards (rv:30.0 / rv:24.6) MFSA 2014-49 Use-after-free and out of bounds issues found using Address Sanitizer MFSA 2014-51 Use-after-free in Event Listener Manager MFSA 2014-52 Use-after-free with SMIL Animation Controller MFSA 2014-53 Buffer overflow in Web Audio Speex resampler MFSA 2014-54 Buffer overflow in Gamepad API MFSA 2014-55 Out of bounds write in NSPR
    last seen 2019-02-21
    modified 2018-11-21
    plugin id 74444
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74444
    title FreeBSD : mozilla -- multiple vulnerabilities (888a0262-f0d9-11e3-ba0c-b4b52fce4ce8)
  • NASL family Windows
    NASL id MOZILLA_FIREFOX_30.NASL
    description The version of Firefox installed on the remote host is a version prior to 30.0 and is, therefore, affected by the following vulnerabilities : - Memory issues exist that could lead to arbitrary code execution. Note that these issues only affect Firefox 29. (CVE-2014-1533, CVE-2014-1534) - An out-of-bounds read issue exists in 'PropertyProvider::FindJustificationRange'. (CVE-2014-1536) - Use-after-free memory issues exist in 'mozilla::dom::workers::WorkerPrivateParent', 'nsTextEditRules::CreateMozBR', and the SMIL Animation Controller that could lead to code execution. (CVE-2014-1537, CVE-2014-1538, CVE-2014-1541) - A use-after-free memory issue exists in the event listener manager. Note that this issue only affects Firefox 29. (CVE-2014-1540) - A buffer overflow issue exists in the Speex resampler for Web Audio that could lead to code execution. (CVE-2014-1542) - A buffer overflow issue exists in the Gamepad API that could lead to code execution. Note that this issue only affects Firefox 29 on Windows 8 when a physical or virtual gamepad is attached. (CVE-2014-1543)
    last seen 2019-02-21
    modified 2014-07-26
    plugin id 74440
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74440
    title Firefox < 30.0 Multiple Vulnerabilities
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2014-0742.NASL
    description From Red Hat Security Advisory 2014:0742 : An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de Mooij, Ryan VanderMeulen, Jeff Walden, Kyle Huey, Abhishek Arya, and Nils as the original reporters of these issues. Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. For technical details regarding these flaws, refer to the Mozilla security advisories for Thunderbird 24.6.0. You can find a link to the Mozilla advisories in the References section of this erratum. All Thunderbird users should upgrade to this updated package, which contains Thunderbird version 24.6.0, which corrects these issues. After installing the update, Thunderbird must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2015-12-01
    plugin id 74456
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74456
    title Oracle Linux 6 : thunderbird (ELSA-2014-0742)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2014-0742.NASL
    description An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de Mooij, Ryan VanderMeulen, Jeff Walden, Kyle Huey, Abhishek Arya, and Nils as the original reporters of these issues. Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. For technical details regarding these flaws, refer to the Mozilla security advisories for Thunderbird 24.6.0. You can find a link to the Mozilla advisories in the References section of this erratum. All Thunderbird users should upgrade to this updated package, which contains Thunderbird version 24.6.0, which corrects these issues. After installing the update, Thunderbird must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74473
    published 2014-06-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74473
    title CentOS 5 / 6 : thunderbird (CESA-2014:0742)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2250-1.NASL
    description Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de Mooij, Ryan VanderMeulen, Jeff Walden and Kyle Huey discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2014-1533) Abhishek Arya discovered multiple use-after-free and out-of-bounds read issues in Thunderbird. If a user had enabled scripting, an attacker could potentially exploit these to cause a denial of service via application crash or execute arbitrary code with the priviliges of the user invoking Thunderbird. (CVE-2014-1538) A use-after-free was discovered in the SMIL animation controller. If a user had enabled scripting, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the priviliges of the user invoking Thunderbird. (CVE-2014-1541). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 76158
    published 2014-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76158
    title Ubuntu 12.04 LTS / 13.10 / 14.04 LTS : thunderbird vulnerabilities (USN-2250-1)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_THUNDERBIRD_24_6.NASL
    description The version of Thunderbird installed on the remote Mac OS X host is a version prior to 24.6. It is, therefore, affected by the following vulnerabilities : - Memory issues exist that could lead to arbitrary code execution. (CVE-2014-1533, CVE-2014-1534) - An out-of-bounds read issue exists in 'PropertyProvider::FindJustificationRange'. (CVE-2014-1536) - Use-after-free memory issues exist in 'mozilla::dom::workers::WorkerPrivateParent', 'nsTextEditRules::CreateMozBR', and the SMIL Animation Controller that could lead to code execution. (CVE-2014-1537, CVE-2014-1538, CVE-2014-1541)
    last seen 2019-02-21
    modified 2014-07-26
    plugin id 74438
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74438
    title Thunderbird < 24.6 Multiple Vulnerabilities (Mac OS X)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2014-448.NASL
    description seamonkey was updated to version 2.26.1 to fix nine security issues. These security issues were fixed : - Miscellaneous memory safety hazards (CVE-2014-1533/CVE-2014-1534) - Use-after-free and out of bounds issues found using Address Sanitizer (CVE-2014-1536/CVE-2014-1537/CVE-2014-1538) - Use-after-free in Event Listener Manager (CVE-2014-1540) - Use-after-free with SMIL Animation Controller (CVE-2014-1541) - Buffer overflow in Web Audio Speex resampler (CVE-2014-1542) - Out of bounds write in NSPR (CVE-2014-1545)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 76339
    published 2014-07-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76339
    title openSUSE Security Update : seamonkey (openSUSE-SU-2014:0855-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_FIREFOX-2014-06-140612.NASL
    description Mozilla Firefox was updated to version 24.6.0 to fix six security issues : - Miscellaneous memory safety hazards. (CVE-2014-1533 / CVE-2014-1534) - Use-after-free and out of bounds issues found using Address Sanitizer. (CVE-2014-1536 / CVE-2014-1537 / CVE-2014-1538) - Use-after-free with SMIL Animation Controller. (CVE-2014-1541) mozilla-nspr was updated to version 4.10.6 to fix one security issue : - Out of bounds write in NSPR. (CVE-2014-1545) Further information can be found at https://www.mozilla.org/security/announce/ .
    last seen 2019-02-21
    modified 2014-07-26
    plugin id 76188
    published 2014-06-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76188
    title SuSE 11.3 Security Update : MozillaFirefox (SAT Patch Number 9370)
  • NASL family Windows
    NASL id SEAMONKEY_2_26_1.NASL
    description The installed version of SeaMonkey is a version prior to 2.26.1. It is, therefore, affected by the following vulnerabilities : - There are multiple memory safety bugs in the browser engine. Several of these bugs show evidence of memory corruption, which may allow an attacker to execute arbitrary code. (CVE-2014-1533, CVE-2014-1534) - There are multiple use-after-free and out of bounds read issues. These issues have the potential to be exploited, resulting in remote code execution. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538) - A use-after-free error exists in the SMIL Animation Controller when interacting with and rendering improperly formed web content. This may result in a potentially exploitable crash. (CVE-2014-1541) - A use-after-free flaw exists in the event listener manager that can be triggered by web content. This may result in a potentially exploitable crash. (CVE-2014-1540) - A flaw exists in the Speex resample in Web Audio that results in a buffer overflow when working with audio content that exceeds the expected bounds. This flaw results in a potentially exploitable crash. (CVE-2014-1542) - There exists a buffer overflow in the Gamepad API when it is exercised with a gamepad device with non-contiguous axes. This flaw results in a potentially exploitable crash. (CVE-2014-1543)
    last seen 2019-02-21
    modified 2018-07-27
    plugin id 77283
    published 2014-08-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=77283
    title SeaMonkey < 2.26.1 Multiple Vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2014-0741.NASL
    description Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de Mooij, Ryan VanderMeulen, Jeff Walden, Kyle Huey, Abhishek Arya, and Nils as the original reporters of these issues. For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 24.6.0 ESR. You can find a link to the Mozilla advisories in the References section of this erratum. All Firefox users should upgrade to these updated packages, which contain Firefox version 24.6.0 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74459
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74459
    title RHEL 5 / 6 / 7 : firefox (RHSA-2014:0741)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2014-447.NASL
    description MozillaThunderbird was updated to version 24.6.0 to fix six security issues : - Miscellaneous memory safety hazards (CVE-2014-1533/CVE-2014-1534) - Use-after-free and out of bounds issues found using Address Sanitizer (CVE-2014-1536/CVE-2014-1537/CVE-2014-1538) - Use-after-free with SMIL Animation Controller (CVE-2014-1541)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 76338
    published 2014-07-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76338
    title openSUSE Security Update : MozillaThunderbird (openSUSE-SU-2014:0858-1)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20140610_THUNDERBIRD_ON_SL5_X.NASL
    description Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. After installing the update, Thunderbird must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 74491
    published 2014-06-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74491
    title Scientific Linux Security Update : thunderbird on SL5.x, SL6.x i386/x86_64
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201504-01.NASL
    description The remote host is affected by the vulnerability described in GLSA-201504-01 (Mozilla Products: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Firefox, Thunderbird, and SeaMonkey. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, spoof the address bar, conduct clickjacking attacks, bypass security restrictions and protection mechanisms, or have other unspecified impact. Workaround : There are no known workarounds at this time.
    last seen 2019-02-21
    modified 2016-11-11
    plugin id 82632
    published 2015-04-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82632
    title GLSA-201504-01 : Mozilla Products: Multiple vulnerabilities
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2014-0741.NASL
    description Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de Mooij, Ryan VanderMeulen, Jeff Walden, Kyle Huey, Abhishek Arya, and Nils as the original reporters of these issues. For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 24.6.0 ESR. You can find a link to the Mozilla advisories in the References section of this erratum. All Firefox users should upgrade to these updated packages, which contain Firefox version 24.6.0 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74472
    published 2014-06-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74472
    title CentOS 5 / 6 : firefox (CESA-2014:0741)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2014-0742.NASL
    description An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de Mooij, Ryan VanderMeulen, Jeff Walden, Kyle Huey, Abhishek Arya, and Nils as the original reporters of these issues. Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. For technical details regarding these flaws, refer to the Mozilla security advisories for Thunderbird 24.6.0. You can find a link to the Mozilla advisories in the References section of this erratum. All Thunderbird users should upgrade to this updated package, which contains Thunderbird version 24.6.0, which corrects these issues. After installing the update, Thunderbird must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74460
    published 2014-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74460
    title RHEL 5 / 6 : thunderbird (RHSA-2014:0742)
redhat via4
advisories
  • bugzilla
    id 1107424
    title CVE-2014-1541 Mozilla: Use-after-free with SMIL Animation Controller (MFSA 2014-52)
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhsa:tst:20070055001
      • comment firefox is earlier than 0:24.6.0-1.el5_10
        oval oval:com.redhat.rhsa:tst:20140741002
      • comment firefox is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhsa:tst:20070097009
    • AND
      • comment firefox is earlier than 0:24.6.0-1.el6_5
        oval oval:com.redhat.rhsa:tst:20140741008
      • comment firefox is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100861010
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhsa:tst:20100842001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhsa:tst:20100842002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhsa:tst:20100842003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhsa:tst:20100842004
    • AND
      • OR
        • comment Red Hat Enterprise Linux 7 Client is installed
          oval oval:com.redhat.rhsa:tst:20140675001
        • comment Red Hat Enterprise Linux 7 Server is installed
          oval oval:com.redhat.rhsa:tst:20140675002
        • comment Red Hat Enterprise Linux 7 Workstation is installed
          oval oval:com.redhat.rhsa:tst:20140675003
        • comment Red Hat Enterprise Linux 7 ComputeNode is installed
          oval oval:com.redhat.rhsa:tst:20140675004
      • OR
        • AND
          • comment firefox is earlier than 0:24.6.0-1.el7_0
            oval oval:com.redhat.rhsa:tst:20140741014
          • comment firefox is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100861010
        • AND
          • comment xulrunner is earlier than 0:24.6.0-1.el7_0
            oval oval:com.redhat.rhsa:tst:20140741015
          • comment xulrunner is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100861006
        • AND
          • comment xulrunner-devel is earlier than 0:24.6.0-1.el7_0
            oval oval:com.redhat.rhsa:tst:20140741017
          • comment xulrunner-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100861008
    rhsa
    id RHSA-2014:0741
    released 2014-06-10
    severity Critical
    title RHSA-2014:0741: firefox security update (Critical)
  • bugzilla
    id 1107424
    title CVE-2014-1541 Mozilla: Use-after-free with SMIL Animation Controller (MFSA 2014-52)
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhsa:tst:20070055001
      • comment thunderbird is earlier than 0:24.6.0-1.el5_10
        oval oval:com.redhat.rhsa:tst:20140742002
      • comment thunderbird is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhsa:tst:20070108003
    • AND
      • comment thunderbird is earlier than 0:24.6.0-1.el6_5
        oval oval:com.redhat.rhsa:tst:20140742008
      • comment thunderbird is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100896006
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhsa:tst:20100842001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhsa:tst:20100842002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhsa:tst:20100842003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhsa:tst:20100842004
    rhsa
    id RHSA-2014:0742
    released 2014-06-10
    severity Important
    title RHSA-2014:0742: thunderbird security update (Important)
rpms
  • firefox-0:24.6.0-1.el5_10
  • firefox-0:24.6.0-1.el6_5
  • firefox-0:24.6.0-1.el7_0
  • xulrunner-0:24.6.0-1.el7_0
  • xulrunner-devel-0:24.6.0-1.el7_0
  • thunderbird-0:24.6.0-1.el5_10
  • thunderbird-0:24.6.0-1.el6_5
refmap via4
bid 67979
confirm
debian
  • DSA-2955
  • DSA-2960
gentoo GLSA-201504-01
sectrack
  • 1030386
  • 1030388
secunia
  • 58984
  • 59052
  • 59149
  • 59150
  • 59165
  • 59169
  • 59170
  • 59171
  • 59229
  • 59275
  • 59328
  • 59377
  • 59387
  • 59425
  • 59486
  • 59866
suse
  • SUSE-SU-2014:0824
  • openSUSE-SU-2014:0797
  • openSUSE-SU-2014:0819
  • openSUSE-SU-2014:0855
  • openSUSE-SU-2014:0858
ubuntu
  • USN-2243-1
  • USN-2250-1
Last major update 06-01-2017 - 21:59
Published 11-06-2014 - 06:57
Last modified 27-12-2017 - 21:29
Back to Top