Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-1514
Vulnerability from cvelistv5
Published
2014-03-19 10:00
Modified
2024-08-06 09:42
Severity ?
EPSS score ?
Summary
vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:42:36.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2014:0310", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html" }, { "name": "DSA-2911", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2911" }, { "name": "GLSA-201504-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201504-01" }, { "name": "SUSE-SU-2014:0418", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2151-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2151-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html" }, { "name": "DSA-2881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=983344" }, { "name": "66240", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66240" }, { "name": "openSUSE-SU-2014:0419", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" }, { "name": "RHSA-2014:0316", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html" }, { "name": "openSUSE-SU-2014:0584", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" }, { "name": "openSUSE-SU-2014:0448", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-15T17:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "RHSA-2014:0310", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html" }, { "name": "DSA-2911", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2911" }, { "name": "GLSA-201504-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201504-01" }, { "name": "SUSE-SU-2014:0418", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2151-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2151-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html" }, { "name": "DSA-2881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=983344" }, { "name": "66240", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66240" }, { "name": "openSUSE-SU-2014:0419", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" }, { "name": "RHSA-2014:0316", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html" }, { "name": "openSUSE-SU-2014:0584", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" }, { "name": "openSUSE-SU-2014:0448", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2014-1514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2014:0310", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html" }, { "name": "DSA-2911", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2911" }, { "name": "GLSA-201504-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201504-01" }, { "name": "SUSE-SU-2014:0418", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2151-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2151-1" }, { "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html" }, { "name": "DSA-2881", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2881" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=983344", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=983344" }, { "name": "66240", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66240" }, { "name": "openSUSE-SU-2014:0419", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" }, { "name": "RHSA-2014:0316", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html" }, { "name": "openSUSE-SU-2014:0584", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" }, { "name": "openSUSE-SU-2014:0448", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2014-1514", "datePublished": "2014-03-19T10:00:00", "dateReserved": "2014-01-16T00:00:00", "dateUpdated": "2024-08-06T09:42:36.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-1514\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2014-03-19T10:55:06.723\",\"lastModified\":\"2024-11-21T02:04:27.337\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.\"},{\"lang\":\"es\",\"value\":\"vmtypedarrayobject.cpp en Mozilla Firefox anterior a 28.0, Firefox ESR 24.x anterior a 24.4, Thunderbird anterior a 24.4 y SeaMonkey anterior a 2.25 no valida la longitud del array de destino antes de una operaci\u00f3n de copiar, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (escritura fuera de rango y ca\u00edda de aplicaci\u00f3n) mediante el aprovechamiento del uso incorrecto de la clase TypedArrayObject.\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"28.0\",\"matchCriteriaId\":\"422EC5FE-DA03-4C14-ADED-D6212BE074D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"24.0\",\"versionEndExcluding\":\"24.4\",\"matchCriteriaId\":\"F43E2CDB-F255-4199-A33E-BBFD18BA241C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.25\",\"matchCriteriaId\":\"097F1C3A-4546-43F3-8CC2-50F8AF05B791\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"24.4\",\"matchCriteriaId\":\"507FBFAF-784E-4C0E-B959-9380C31EBD1B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3407560-6D54-4B1B-9977-AD4F6EB5D6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE554781-1EB9-446E-911F-6C11970C47F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4BC592E-17CC-4DD4-8B2C-CFD99383649C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD4BBD63-E038-45CE-9537-D96831E99A06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*\",\"matchCriteriaId\":\"0EA03350-8702-43D5-8605-5FB765A3F60B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569964DA-31BE-4520-A66D-C3B09D557AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45010D45-2FF2-4B04-B115-6B6FE606D598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"835AE071-CEAE-49E5-8F0C-E5F50FB85EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2076871-2E80-4605-A470-A41C1A8EC7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F61F047-129C-41A6-8A27-FFCBB8563E91\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0310.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0316.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2881\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2911\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2014/mfsa2014-32.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/66240\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2151-1\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=983344\",\"source\":\"security@mozilla.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201504-01\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0310.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0316.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2881\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2911\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2014/mfsa2014-32.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/66240\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2151-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=983344\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201504-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2014_0310
Vulnerability from csaf_redhat
Published
2014-03-18 20:34
Modified
2024-11-22 07:40
Summary
Red Hat Security Advisory: firefox security update
Notes
Topic
Updated firefox packages that fix several security issues are now available
for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2014-1493, CVE-2014-1510, CVE-2014-1511, CVE-2014-1512,
CVE-2014-1513, CVE-2014-1514)
Several information disclosure flaws were found in the way Firefox
processed malformed web content. An attacker could use these flaws to gain
access to sensitive information such as cross-domain content or protected
memory addresses or, potentially, cause Firefox to crash. (CVE-2014-1497,
CVE-2014-1508, CVE-2014-1505)
A memory corruption flaw was found in the way Firefox rendered certain PDF
files. An attacker able to trick a user into installing a malicious
extension could use this flaw to crash Firefox or, potentially, execute
arbitrary code with the privileges of the user running Firefox.
(CVE-2014-1509)
Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij,
Jesse Ruderman, Dan Gohman, Christoph Diehl, Atte Kettunen, Tyson Smith,
Jesse Schwartzentruber, John Thomson, Robert O'Callahan, Mariusz Mlynski,
Jüri Aedla, George Hotz, and the security research firm VUPEN as the
original reporters of these issues.
For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 24.4.0 ESR. You can find a link to the Mozilla
advisories in the References section of this erratum.
All Firefox users should upgrade to these updated packages, which contain
Firefox version 24.4.0 ESR, which corrects these issues. After installing
the update, Firefox must be restarted for the changes to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated firefox packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2014-1493, CVE-2014-1510, CVE-2014-1511, CVE-2014-1512,\nCVE-2014-1513, CVE-2014-1514)\n\nSeveral information disclosure flaws were found in the way Firefox\nprocessed malformed web content. An attacker could use these flaws to gain\naccess to sensitive information such as cross-domain content or protected\nmemory addresses or, potentially, cause Firefox to crash. (CVE-2014-1497,\nCVE-2014-1508, CVE-2014-1505)\n\nA memory corruption flaw was found in the way Firefox rendered certain PDF\nfiles. An attacker able to trick a user into installing a malicious\nextension could use this flaw to crash Firefox or, potentially, execute\narbitrary code with the privileges of the user running Firefox.\n(CVE-2014-1509)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij,\nJesse Ruderman, Dan Gohman, Christoph Diehl, Atte Kettunen, Tyson Smith,\nJesse Schwartzentruber, John Thomson, Robert O\u0027Callahan, Mariusz Mlynski,\nJ\u00fcri Aedla, George Hotz, and the security research firm VUPEN as the\noriginal reporters of these issues.\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 24.4.0 ESR. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 24.4.0 ESR, which corrects these issues. After installing\nthe update, Firefox must be restarted for the changes to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0310", "url": "https://access.redhat.com/errata/RHSA-2014:0310" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html", "url": "http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html" }, { "category": "external", "summary": "1077013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077013" }, { "category": "external", "summary": "1077016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077016" }, { "category": "external", "summary": "1077025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077025" }, { "category": "external", "summary": "1077028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077028" }, { "category": "external", "summary": "1077029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077029" }, { "category": "external", "summary": "1077490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490" }, { "category": "external", "summary": "1077491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077491" }, { "category": "external", "summary": "1077492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077492" }, { "category": "external", "summary": "1077494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077494" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0310.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T07:40:11+00:00", "generator": { "date": "2024-11-22T07:40:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0310", "initial_release_date": "2014-03-18T20:34:18+00:00", "revision_history": [ { "date": "2014-03-18T20:34:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-03-18T20:34:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:40:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el5_10.i386", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.i386", "product_id": "firefox-debuginfo-0:24.4.0-1.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el5_10?arch=i386" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el5_10.i386", "product": { "name": "firefox-0:24.4.0-1.el5_10.i386", "product_id": "firefox-0:24.4.0-1.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "product_id": "firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el5_10.x86_64", "product": { "name": "firefox-0:24.4.0-1.el5_10.x86_64", "product_id": "firefox-0:24.4.0-1.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "product_id": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el6_5.x86_64", "product": { "name": "firefox-0:24.4.0-1.el6_5.x86_64", "product_id": "firefox-0:24.4.0-1.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el6_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:24.4.0-1.el5_10.src", "product": { "name": "firefox-0:24.4.0-1.el5_10.src", "product_id": "firefox-0:24.4.0-1.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el5_10?arch=src" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el6_5.src", "product": { "name": "firefox-0:24.4.0-1.el6_5.src", "product_id": "firefox-0:24.4.0-1.el6_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el6_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "product_id": "firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el5_10.ppc", "product": { "name": "firefox-0:24.4.0-1.el5_10.ppc", "product_id": "firefox-0:24.4.0-1.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "product_id": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el6_5?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el6_5.ppc", "product": { "name": "firefox-0:24.4.0-1.el6_5.ppc", "product_id": "firefox-0:24.4.0-1.el6_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el6_5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "product_id": "firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el5_10.s390x", "product": { "name": "firefox-0:24.4.0-1.el5_10.s390x", "product_id": "firefox-0:24.4.0-1.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "product_id": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el6_5.s390x", "product": { "name": "firefox-0:24.4.0-1.el6_5.s390x", "product_id": "firefox-0:24.4.0-1.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el6_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el5_10.s390", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.s390", "product_id": "firefox-debuginfo-0:24.4.0-1.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el5_10?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el5_10.s390", "product": { "name": "firefox-0:24.4.0-1.el5_10.s390", "product_id": "firefox-0:24.4.0-1.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el5_10?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390", "product_id": "firefox-debuginfo-0:24.4.0-1.el6_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el6_5?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el6_5.s390", "product": { "name": "firefox-0:24.4.0-1.el6_5.s390", "product_id": "firefox-0:24.4.0-1.el6_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el6_5?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "product_id": "firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el5_10.ia64", "product": { "name": "firefox-0:24.4.0-1.el5_10.ia64", "product_id": "firefox-0:24.4.0-1.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el6_5.i686", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.i686", "product_id": "firefox-debuginfo-0:24.4.0-1.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el6_5?arch=i686" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el6_5.i686", "product": { "name": "firefox-0:24.4.0-1.el6_5.i686", "product_id": "firefox-0:24.4.0-1.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el6_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "product": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "product_id": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@24.4.0-1.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "firefox-0:24.4.0-1.el6_5.ppc64", "product": { "name": "firefox-0:24.4.0-1.el6_5.ppc64", "product_id": "firefox-0:24.4.0-1.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@24.4.0-1.el6_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386" }, "product_reference": "firefox-0:24.4.0-1.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64" }, "product_reference": "firefox-0:24.4.0-1.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc" }, "product_reference": "firefox-0:24.4.0-1.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390" }, "product_reference": "firefox-0:24.4.0-1.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x" }, "product_reference": "firefox-0:24.4.0-1.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src" }, "product_reference": "firefox-0:24.4.0-1.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64" }, "product_reference": "firefox-0:24.4.0-1.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386" }, "product_reference": "firefox-0:24.4.0-1.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64" }, "product_reference": "firefox-0:24.4.0-1.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc" }, "product_reference": "firefox-0:24.4.0-1.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390" }, "product_reference": "firefox-0:24.4.0-1.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x" }, "product_reference": "firefox-0:24.4.0-1.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src" }, "product_reference": "firefox-0:24.4.0-1.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64" }, "product_reference": "firefox-0:24.4.0-1.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686" }, "product_reference": "firefox-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc" }, "product_reference": "firefox-0:24.4.0-1.el6_5.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "firefox-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390" }, "product_reference": "firefox-0:24.4.0-1.el6_5.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x" }, "product_reference": "firefox-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src" }, "product_reference": "firefox-0:24.4.0-1.el6_5.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "firefox-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686" }, "product_reference": "firefox-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc" }, "product_reference": "firefox-0:24.4.0-1.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "firefox-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390" }, "product_reference": "firefox-0:24.4.0-1.el6_5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x" }, "product_reference": "firefox-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src" }, "product_reference": "firefox-0:24.4.0-1.el6_5.src", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "firefox-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686" }, "product_reference": "firefox-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc" }, "product_reference": "firefox-0:24.4.0-1.el6_5.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "firefox-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390" }, "product_reference": "firefox-0:24.4.0-1.el6_5.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x" }, "product_reference": "firefox-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src" }, "product_reference": "firefox-0:24.4.0-1.el6_5.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "firefox-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686" }, "product_reference": "firefox-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc" }, "product_reference": "firefox-0:24.4.0-1.el6_5.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "firefox-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390" }, "product_reference": "firefox-0:24.4.0-1.el6_5.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x" }, "product_reference": "firefox-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src" }, "product_reference": "firefox-0:24.4.0-1.el6_5.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "firefox-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Mozilla project" ] } ], "cve": "CVE-2014-1493", "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077013" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Miscellaneous memory safety hazards (rv:24.4) (MFSA 2014-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1493" }, { "category": "external", "summary": "RHBZ#1077013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1493", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1493" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-15.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-15.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Miscellaneous memory safety hazards (rv:24.4) (MFSA 2014-15)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Atte Kettunen" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1497", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077016" } ], "notes": [ { "category": "description", "text": "The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Out of bounds read during WAV file decoding (MFSA 2014-17)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1497" }, { "category": "external", "summary": "RHBZ#1077016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1497", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1497" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1497", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1497" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-17.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-17.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Out of bounds read during WAV file decoding (MFSA 2014-17)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Robert O\u0027Callahan" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1505", "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077029" } ], "notes": [ { "category": "description", "text": "The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: SVG filters information disclosure through feDisplacementMap (MFSA 2014-28)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1505" }, { "category": "external", "summary": "RHBZ#1077029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1505", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1505" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-28.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-28.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: SVG filters information disclosure through feDisplacementMap (MFSA 2014-28)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Tyson Smith", "Jesse Schwartzentruber" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1508", "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077025" } ], "notes": [ { "category": "description", "text": "The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Information disclosure through polygon rendering in MathML (MFSA 2014-26)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1508" }, { "category": "external", "summary": "RHBZ#1077025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077025" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1508", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1508" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-26.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-26.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Information disclosure through polygon rendering in MathML (MFSA 2014-26)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "John Thomson" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1509", "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077028" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory corruption in Cairo during PDF font rendering (MFSA 2014-27)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1509" }, { "category": "external", "summary": "RHBZ#1077028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1509", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1509" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1509", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1509" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-27.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-27.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Memory corruption in Cairo during PDF font rendering (MFSA 2014-27)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Mariusz Mlynski" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1510", "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077490" } ], "notes": [ { "category": "description", "text": "The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1510" }, { "category": "external", "summary": "RHBZ#1077490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1510", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1510" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1510", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1510" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Mariusz Mlynski" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1511", "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077490" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1511" }, { "category": "external", "summary": "RHBZ#1077490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1511", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1511" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Security research firm VUPEN" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1512", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077491" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free in TypeObject (MFSA 2014-30)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1512" }, { "category": "external", "summary": "RHBZ#1077491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077491" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1512", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1512" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-30.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-30.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Use-after-free in TypeObject (MFSA 2014-30)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "J\u00fcri Aedla" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1513", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077492" } ], "notes": [ { "category": "description", "text": "TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Out-of-bounds read/write through neutering ArrayBuffer objects (MFSA 2014-31)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1513" }, { "category": "external", "summary": "RHBZ#1077492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1513", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1513" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-31.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-31.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Out-of-bounds read/write through neutering ArrayBuffer objects (MFSA 2014-31)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "George Hotz" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1514", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077494" } ], "notes": [ { "category": "description", "text": "vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Out-of-bounds write through TypedArrayObject after neutering (MFSA 2014-32)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1514" }, { "category": "external", "summary": "RHBZ#1077494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077494" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1514", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1514" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-18T20:34:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0310" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Client-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.src", "5Server-5.10.Z:firefox-0:24.4.0-1.el5_10.x86_64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ia64", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.ppc", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.s390x", "5Server-5.10.Z:firefox-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Client-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6ComputeNode-optional-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6ComputeNode-optional-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Server-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:firefox-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:firefox-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Out-of-bounds write through TypedArrayObject after neutering (MFSA 2014-32)" } ] }
rhsa-2014_0316
Vulnerability from csaf_redhat
Published
2014-03-19 17:26
Modified
2024-11-22 07:40
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user running
Thunderbird. (CVE-2014-1493, CVE-2014-1510, CVE-2014-1511, CVE-2014-1512,
CVE-2014-1513, CVE-2014-1514)
Several information disclosure flaws were found in the way Thunderbird
processed malformed web content. An attacker could use these flaws to gain
access to sensitive information such as cross-domain content or protected
memory addresses or, potentially, cause Thunderbird to crash.
(CVE-2014-1497, CVE-2014-1508, CVE-2014-1505)
A memory corruption flaw was found in the way Thunderbird rendered certain
PDF files. An attacker able to trick a user into installing a malicious
extension could use this flaw to crash Thunderbird or, potentially, execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2014-1509)
Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij,
Jesse Ruderman, Dan Gohman, Christoph Diehl, Atte Kettunen, Tyson Smith,
Jesse Schwartzentruber, John Thomson, Robert O'Callahan, Mariusz Mlynski,
Jüri Aedla, George Hotz, and the security research firm VUPEN as the
original reporters of these issues.
Note: All of the above issues cannot be exploited by a specially-crafted
HTML mail message as JavaScript is disabled by default for mail messages.
They could be exploited another way in Thunderbird, for example, when
viewing the full remote content of an RSS feed.
For technical details regarding these flaws, refer to the Mozilla security
advisories for Thunderbird 24.4.0. You can find a link to the Mozilla
advisories in the References section of this erratum.
All Thunderbird users should upgrade to this updated package, which
contains Thunderbird version 24.4.0, which corrects these issues.
After installing the update, Thunderbird must be restarted for the changes
to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated thunderbird package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Thunderbird to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nThunderbird. (CVE-2014-1493, CVE-2014-1510, CVE-2014-1511, CVE-2014-1512,\nCVE-2014-1513, CVE-2014-1514)\n\nSeveral information disclosure flaws were found in the way Thunderbird\nprocessed malformed web content. An attacker could use these flaws to gain\naccess to sensitive information such as cross-domain content or protected\nmemory addresses or, potentially, cause Thunderbird to crash.\n(CVE-2014-1497, CVE-2014-1508, CVE-2014-1505)\n\nA memory corruption flaw was found in the way Thunderbird rendered certain\nPDF files. An attacker able to trick a user into installing a malicious\nextension could use this flaw to crash Thunderbird or, potentially, execute\narbitrary code with the privileges of the user running Thunderbird.\n(CVE-2014-1509)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij,\nJesse Ruderman, Dan Gohman, Christoph Diehl, Atte Kettunen, Tyson Smith,\nJesse Schwartzentruber, John Thomson, Robert O\u0027Callahan, Mariusz Mlynski,\nJ\u00fcri Aedla, George Hotz, and the security research firm VUPEN as the\noriginal reporters of these issues.\n\nNote: All of the above issues cannot be exploited by a specially-crafted\nHTML mail message as JavaScript is disabled by default for mail messages.\nThey could be exploited another way in Thunderbird, for example, when\nviewing the full remote content of an RSS feed.\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Thunderbird 24.4.0. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nAll Thunderbird users should upgrade to this updated package, which\ncontains Thunderbird version 24.4.0, which corrects these issues.\nAfter installing the update, Thunderbird must be restarted for the changes\nto take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0316", "url": "https://access.redhat.com/errata/RHSA-2014:0316" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html", "url": "https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html" }, { "category": "external", "summary": "1077013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077013" }, { "category": "external", "summary": "1077016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077016" }, { "category": "external", "summary": "1077025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077025" }, { "category": "external", "summary": "1077028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077028" }, { "category": "external", "summary": "1077029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077029" }, { "category": "external", "summary": "1077490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490" }, { "category": "external", "summary": "1077491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077491" }, { "category": "external", "summary": "1077492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077492" }, { "category": "external", "summary": "1077494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077494" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0316.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T07:40:16+00:00", "generator": { "date": "2024-11-22T07:40:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0316", "initial_release_date": "2014-03-19T17:26:37+00:00", "revision_history": [ { "date": "2014-03-19T17:26:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-03-19T17:26:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:40:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_productivity:5" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "product": { "name": "thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "product_id": "thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.4.0-1.el5_10?arch=i386" } } }, { "category": "product_version", "name": "thunderbird-0:24.4.0-1.el5_10.i386", "product": { "name": "thunderbird-0:24.4.0-1.el5_10.i386", "product_id": "thunderbird-0:24.4.0-1.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.4.0-1.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "product": { "name": "thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "product_id": "thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.4.0-1.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-0:24.4.0-1.el5_10.x86_64", "product": { "name": "thunderbird-0:24.4.0-1.el5_10.x86_64", "product_id": "thunderbird-0:24.4.0-1.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.4.0-1.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "product": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "product_id": "thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.4.0-1.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-0:24.4.0-1.el6_5.x86_64", "product": { "name": "thunderbird-0:24.4.0-1.el6_5.x86_64", "product_id": "thunderbird-0:24.4.0-1.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.4.0-1.el6_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:24.4.0-1.el5_10.src", "product": { "name": "thunderbird-0:24.4.0-1.el5_10.src", "product_id": "thunderbird-0:24.4.0-1.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.4.0-1.el5_10?arch=src" } } }, { "category": "product_version", "name": "thunderbird-0:24.4.0-1.el6_5.src", "product": { "name": "thunderbird-0:24.4.0-1.el6_5.src", "product_id": "thunderbird-0:24.4.0-1.el6_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.4.0-1.el6_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "product": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "product_id": "thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.4.0-1.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "thunderbird-0:24.4.0-1.el6_5.s390x", "product": { "name": "thunderbird-0:24.4.0-1.el6_5.s390x", "product_id": "thunderbird-0:24.4.0-1.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.4.0-1.el6_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "product": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "product_id": "thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.4.0-1.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "thunderbird-0:24.4.0-1.el6_5.ppc64", "product": { "name": "thunderbird-0:24.4.0-1.el6_5.ppc64", "product_id": "thunderbird-0:24.4.0-1.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.4.0-1.el6_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "product": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "product_id": "thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@24.4.0-1.el6_5?arch=i686" } } }, { "category": "product_version", "name": "thunderbird-0:24.4.0-1.el6_5.i686", "product": { "name": "thunderbird-0:24.4.0-1.el6_5.i686", "product_id": "thunderbird-0:24.4.0-1.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@24.4.0-1.el6_5?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386" }, "product_reference": "thunderbird-0:24.4.0-1.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src" }, "product_reference": "thunderbird-0:24.4.0-1.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64" }, "product_reference": "thunderbird-0:24.4.0-1.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386" }, "product_reference": "thunderbird-0:24.4.0-1.el5_10.i386", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el5_10.src as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src" }, "product_reference": "thunderbird-0:24.4.0-1.el5_10.src", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64" }, "product_reference": "thunderbird-0:24.4.0-1.el5_10.x86_64", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el5_10.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "relates_to_product_reference": "5Server-DPAS-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.src", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" }, "product_reference": "thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Mozilla project" ] } ], "cve": "CVE-2014-1493", "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077013" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Miscellaneous memory safety hazards (rv:24.4) (MFSA 2014-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1493" }, { "category": "external", "summary": "RHBZ#1077013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1493", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1493" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-15.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-15.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Miscellaneous memory safety hazards (rv:24.4) (MFSA 2014-15)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Atte Kettunen" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1497", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077016" } ], "notes": [ { "category": "description", "text": "The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Out of bounds read during WAV file decoding (MFSA 2014-17)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1497" }, { "category": "external", "summary": "RHBZ#1077016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1497", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1497" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1497", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1497" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-17.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-17.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Out of bounds read during WAV file decoding (MFSA 2014-17)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Robert O\u0027Callahan" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1505", "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077029" } ], "notes": [ { "category": "description", "text": "The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: SVG filters information disclosure through feDisplacementMap (MFSA 2014-28)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1505" }, { "category": "external", "summary": "RHBZ#1077029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1505", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1505" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-28.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-28.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: SVG filters information disclosure through feDisplacementMap (MFSA 2014-28)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Tyson Smith", "Jesse Schwartzentruber" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1508", "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077025" } ], "notes": [ { "category": "description", "text": "The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Information disclosure through polygon rendering in MathML (MFSA 2014-26)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1508" }, { "category": "external", "summary": "RHBZ#1077025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077025" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1508", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1508" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-26.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-26.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Information disclosure through polygon rendering in MathML (MFSA 2014-26)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "John Thomson" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1509", "discovery_date": "2014-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077028" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory corruption in Cairo during PDF font rendering (MFSA 2014-27)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1509" }, { "category": "external", "summary": "RHBZ#1077028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1509", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1509" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1509", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1509" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-27.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-27.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla: Memory corruption in Cairo during PDF font rendering (MFSA 2014-27)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Mariusz Mlynski" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1510", "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077490" } ], "notes": [ { "category": "description", "text": "The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1510" }, { "category": "external", "summary": "RHBZ#1077490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1510", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1510" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1510", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1510" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Mariusz Mlynski" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1511", "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077490" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1511" }, { "category": "external", "summary": "RHBZ#1077490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1511", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1511" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "Security research firm VUPEN" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1512", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077491" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Use-after-free in TypeObject (MFSA 2014-30)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1512" }, { "category": "external", "summary": "RHBZ#1077491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077491" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1512", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1512" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-30.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-30.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Use-after-free in TypeObject (MFSA 2014-30)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "J\u00fcri Aedla" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1513", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077492" } ], "notes": [ { "category": "description", "text": "TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Out-of-bounds read/write through neutering ArrayBuffer objects (MFSA 2014-31)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1513" }, { "category": "external", "summary": "RHBZ#1077492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1513", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1513" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-31.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-31.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Out-of-bounds read/write through neutering ArrayBuffer objects (MFSA 2014-31)" }, { "acknowledgments": [ { "names": [ "Mozilla project" ] }, { "names": [ "George Hotz" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-1514", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077494" } ], "notes": [ { "category": "description", "text": "vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Out-of-bounds write through TypedArrayObject after neutering (MFSA 2014-32)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1514" }, { "category": "external", "summary": "RHBZ#1077494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077494" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1514", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1514" }, { "category": "external", "summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html" } ], "release_date": "2014-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-19T17:26:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0316" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Client-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Client-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.src", "5Server-DPAS-5.10.Z:thunderbird-0:24.4.0-1.el5_10.x86_64", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.i386", "5Server-DPAS-5.10.Z:thunderbird-debuginfo-0:24.4.0-1.el5_10.x86_64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Client-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Client-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Server-optional-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Server-optional-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.src", "6Workstation-6.5.z:thunderbird-0:24.4.0-1.el6_5.x86_64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.i686", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.ppc64", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.s390x", "6Workstation-6.5.z:thunderbird-debuginfo-0:24.4.0-1.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla: Out-of-bounds write through TypedArrayObject after neutering (MFSA 2014-32)" } ] }
ghsa-8jfj-fq3q-fgxw
Vulnerability from github
Published
2022-05-13 01:24
Modified
2022-05-13 01:24
Severity ?
Details
vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
{ "affected": [], "aliases": [ "CVE-2014-1514" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-03-19T10:55:00Z", "severity": "CRITICAL" }, "details": "vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.", "id": "GHSA-8jfj-fq3q-fgxw", "modified": "2022-05-13T01:24:31Z", "published": "2022-05-13T01:24:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1514" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=983344" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201504-01" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2881" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2911" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/66240" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2151-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2014-1514
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-1514", "description": "vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.", "id": "GSD-2014-1514", "references": [ "https://www.suse.com/security/cve/CVE-2014-1514.html", "https://www.debian.org/security/2014/dsa-2911", "https://www.debian.org/security/2014/dsa-2881", "https://access.redhat.com/errata/RHSA-2014:0316", "https://access.redhat.com/errata/RHSA-2014:0310", "https://advisories.mageia.org/CVE-2014-1514.html", "https://linux.oracle.com/cve/CVE-2014-1514.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-1514" ], "details": "vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.", "id": "GSD-2014-1514", "modified": "2023-12-13T01:22:51.140117Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2014-1514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2014:0310", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html" }, { "name": "DSA-2911", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2911" }, { "name": "GLSA-201504-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201504-01" }, { "name": "SUSE-SU-2014:0418", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2151-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2151-1" }, { "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html" }, { "name": "DSA-2881", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2881" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=983344", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=983344" }, { "name": "66240", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66240" }, { "name": "openSUSE-SU-2014:0419", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" }, { "name": "RHSA-2014:0316", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html" }, { "name": "openSUSE-SU-2014:0584", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" }, { "name": "openSUSE-SU-2014:0448", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "28.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "24.4", "versionStartIncluding": "24.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "24.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2014-1514" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=983344", "refsource": "CONFIRM", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=983344" }, { "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-32.html" }, { "name": "DSA-2881", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-2881" }, { "name": "RHSA-2014:0310", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html" }, { "name": "RHSA-2014:0316", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html" }, { "name": "openSUSE-SU-2014:0419", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" }, { "name": "SUSE-SU-2014:0418", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html" }, { "name": "openSUSE-SU-2014:0448", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" }, { "name": "USN-2151-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2151-1" }, { "name": "openSUSE-SU-2014:0584", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" }, { "name": "66240", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/66240" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "GLSA-201504-01", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201504-01" }, { "name": "DSA-2911", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-2911" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2020-08-05T14:00Z", "publishedDate": "2014-03-19T10:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.