cve-2014-1545
Vulnerability from cvelistv5
Published
2014-06-11 10:00
Modified
2024-08-06 09:42
Severity ?
Summary
Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
References
security@mozilla.orghttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
security@mozilla.orghttp://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
security@mozilla.orghttp://secunia.com/advisories/58984
security@mozilla.orghttp://secunia.com/advisories/59229
security@mozilla.orghttp://secunia.com/advisories/59275
security@mozilla.orghttp://secunia.com/advisories/59318
security@mozilla.orghttp://secunia.com/advisories/59377
security@mozilla.orghttp://secunia.com/advisories/59387
security@mozilla.orghttp://secunia.com/advisories/59425
security@mozilla.orghttp://secunia.com/advisories/59486
security@mozilla.orghttp://secunia.com/advisories/59614
security@mozilla.orghttp://www.debian.org/security/2014/dsa-2955
security@mozilla.orghttp://www.debian.org/security/2014/dsa-2960
security@mozilla.orghttp://www.debian.org/security/2014/dsa-2962
security@mozilla.orghttp://www.mozilla.org/security/announce/2014/mfsa2014-55.htmlVendor Advisory
security@mozilla.orghttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
security@mozilla.orghttp://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
security@mozilla.orghttp://www.securityfocus.com/bid/67975
security@mozilla.orghttp://www.securitytracker.com/id/1030404
security@mozilla.orghttp://www.ubuntu.com/usn/USN-2265-1
security@mozilla.orghttps://bugzilla.mozilla.org/show_bug.cgi?id=1018783
security@mozilla.orghttps://bugzilla.redhat.com/show_bug.cgi?id=1107432
security@mozilla.orghttps://security.gentoo.org/glsa/201504-01
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/58984
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59229
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59275
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59318
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59377
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59387
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59425
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59486
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59614
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2955
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2960
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2962
af854a3a-2127-422b-91ae-364da2661108http://www.mozilla.org/security/announce/2014/mfsa2014-55.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/67975
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030404
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2265-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.mozilla.org/show_bug.cgi?id=1018783
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1107432
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201504-01
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:42:36.276Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
          },
          {
            "name": "59229",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59229"
          },
          {
            "name": "openSUSE-SU-2014:0819",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"
          },
          {
            "name": "SUSE-SU-2014:0824",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"
          },
          {
            "name": "59387",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59387"
          },
          {
            "name": "67975",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67975"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783"
          },
          {
            "name": "DSA-2962",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2962"
          },
          {
            "name": "openSUSE-SU-2014:0855",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"
          },
          {
            "name": "openSUSE-SU-2014:0797",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"
          },
          {
            "name": "59614",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59614"
          },
          {
            "name": "GLSA-201504-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201504-01"
          },
          {
            "name": "1030404",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030404"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
          },
          {
            "name": "openSUSE-SU-2014:0858",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"
          },
          {
            "name": "59377",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59377"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
          },
          {
            "name": "DSA-2960",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2960"
          },
          {
            "name": "DSA-2955",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2955"
          },
          {
            "name": "59318",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59318"
          },
          {
            "name": "58984",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58984"
          },
          {
            "name": "59425",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59425"
          },
          {
            "name": "59275",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59275"
          },
          {
            "name": "59486",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59486"
          },
          {
            "name": "USN-2265-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2265-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-27T18:57:01",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
        },
        {
          "name": "59229",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59229"
        },
        {
          "name": "openSUSE-SU-2014:0819",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"
        },
        {
          "name": "SUSE-SU-2014:0824",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"
        },
        {
          "name": "59387",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59387"
        },
        {
          "name": "67975",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67975"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783"
        },
        {
          "name": "DSA-2962",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2962"
        },
        {
          "name": "openSUSE-SU-2014:0855",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"
        },
        {
          "name": "openSUSE-SU-2014:0797",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"
        },
        {
          "name": "59614",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59614"
        },
        {
          "name": "GLSA-201504-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201504-01"
        },
        {
          "name": "1030404",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030404"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
        },
        {
          "name": "openSUSE-SU-2014:0858",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"
        },
        {
          "name": "59377",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59377"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
        },
        {
          "name": "DSA-2960",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2960"
        },
        {
          "name": "DSA-2955",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2955"
        },
        {
          "name": "59318",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59318"
        },
        {
          "name": "58984",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58984"
        },
        {
          "name": "59425",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59425"
        },
        {
          "name": "59275",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59275"
        },
        {
          "name": "59486",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59486"
        },
        {
          "name": "USN-2265-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2265-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mozilla.org",
          "ID": "CVE-2014-1545",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
            },
            {
              "name": "59229",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59229"
            },
            {
              "name": "openSUSE-SU-2014:0819",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"
            },
            {
              "name": "SUSE-SU-2014:0824",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"
            },
            {
              "name": "59387",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59387"
            },
            {
              "name": "67975",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67975"
            },
            {
              "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783"
            },
            {
              "name": "DSA-2962",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2962"
            },
            {
              "name": "openSUSE-SU-2014:0855",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"
            },
            {
              "name": "openSUSE-SU-2014:0797",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"
            },
            {
              "name": "59614",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59614"
            },
            {
              "name": "GLSA-201504-01",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201504-01"
            },
            {
              "name": "1030404",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030404"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
            },
            {
              "name": "openSUSE-SU-2014:0858",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"
            },
            {
              "name": "59377",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59377"
            },
            {
              "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html",
              "refsource": "CONFIRM",
              "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432"
            },
            {
              "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761",
              "refsource": "CONFIRM",
              "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
            },
            {
              "name": "DSA-2960",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2960"
            },
            {
              "name": "DSA-2955",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2955"
            },
            {
              "name": "59318",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59318"
            },
            {
              "name": "58984",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58984"
            },
            {
              "name": "59425",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59425"
            },
            {
              "name": "59275",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59275"
            },
            {
              "name": "59486",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59486"
            },
            {
              "name": "USN-2265-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2265-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2014-1545",
    "datePublished": "2014-06-11T10:00:00",
    "dateReserved": "2014-01-16T00:00:00",
    "dateUpdated": "2024-08-06T09:42:36.276Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-1545\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2014-06-11T10:57:18.220\",\"lastModified\":\"2024-11-21T02:04:32.507\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.\"},{\"lang\":\"es\",\"value\":\"Mozilla Netscape Portable Runtime (NSPR) anterior a 4.10.6 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (escritura fuera de rango) a trav\u00e9s de vectores que involucren las funciones sprintf y console.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.10.5\",\"matchCriteriaId\":\"C90F4B54-8069-4C12-801E-72C5F44C20F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC289B78-75DE-4E4F-939F-6137D3EAADAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15224A3C-9D36-4745-BC74-93BEB25CA16B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79F29076-6281-4D7E-85BF-DF9C5156FF37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC77EDF-B784-4993-A574-90190167FE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B722B1-9E46-4EEE-89A0-CA22164F10A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD77CCE8-1DEC-46F2-AC81-735AE6D5F739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC42F56-9893-4CB7-A379-EB085D342CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2956E2F-266A-4DDD-8503-3BCB7D380888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92417164-D89D-45F3-A142-DE62700D4392\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1729CA02-8922-4422-A1DB-0A3BC633DFDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F07B17A3-EA29-4958-B622-E0A91CBFE134\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7990E6C0-3604-4DB8-9FAE-74D1F351F171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C289533-5A05-4572-9DBD-4FC329AB27C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7CB64F-0A94-402D-A3BC-B36781BAF827\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36E8D0AC-BE8F-4ACB-88B2-E30A8C5B07BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C9BB339-69FC-403B-980D-394F3DFF571E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C5F3B5E-8DB2-40DB-BDBE-A0254784FD17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D7BA1AF-43F3-4817-9379-17C795A3098D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3CA89AC-63BB-4B6D-8CC7-B376D2EBE05C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71455084-3C16-4626-851D-2FCDE37B6A39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E38E10A-1115-4AAC-B4B2-C776E5EC46EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A68D5AD0-61A5-4F1C-BA85-72BB9B701E1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DD97C6-1E03-4730-BE8D-02BA3CF31E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DCFB0D-DC51-4FD3-967A-62697ECA27E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F7F47DB-56FF-4DCB-97C5-7FA2BE027DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66B7D7F-86E3-4FEE-9E30-5E3CE4790B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6507F1E2-BBB9-4564-BAFA-007935A6E5BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B2185E8-4321-4E9D-8CF9-DEB830B42D2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC9334E9-821F-455D-A1D0-C1885599C00F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8B15BC5-04F8-4D30-B196-24BF2EED9F6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"035EDC9B-0D4F-4D01-8C67-0F771D6570D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9978B12C-258F-4137-BBB1-1DBCB22E105B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7395CC8-6110-4FDF-8EFE-8859A6D267C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCFB9285-B53A-4EE7-BCD5-3C34BE7B5DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73B2FE72-7C9D-4A13-AE00-6AA8D4C870C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"083C28F7-2BB3-4278-8064-0A9F67B18B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE9F027E-40BC-4AD3-BD92-E5493CBA5650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B78F40-12CE-402C-920F-E99195C85917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1814A3-E27A-4BA8-91C7-80906BBB261E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72049D4C-762D-4EA4-85F4-983639EA0A38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9520E8B9-0102-4340-BAC0-EB58ACBE37FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDA28422-D9E4-471A-9BF9-71CDB06B1A65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4121B4C-F211-4632-9AC8-3E74385F14E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7998B791-8D38-424D-821B-F190CDFF942F\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://secunia.com/advisories/58984\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://secunia.com/advisories/59229\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://secunia.com/advisories/59275\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://secunia.com/advisories/59318\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://secunia.com/advisories/59377\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://secunia.com/advisories/59387\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://secunia.com/advisories/59425\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://secunia.com/advisories/59486\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://secunia.com/advisories/59614\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2955\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2960\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2962\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.mozilla.org/security/announce/2014/mfsa2014-55.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.securityfocus.com/bid/67975\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.securitytracker.com/id/1030404\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2265-1\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1018783\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1107432\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://security.gentoo.org/glsa/201504-01\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/58984\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59229\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59275\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59377\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59387\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59486\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59614\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2955\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2960\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mozilla.org/security/announce/2014/mfsa2014-55.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/67975\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1030404\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2265-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1018783\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1107432\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201504-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"Per: http://cwe.mitre.org/data/definitions/787.html\\n\\n\\\"CWE-787: Out-of-bounds Write\\\"\"}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.