fkie_cve-2014-1545
Vulnerability from fkie_nvd
Published
2014-06-11 10:57
Modified
2025-04-12 10:46
Severity ?
Summary
Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C90F4B54-8069-4C12-801E-72C5F44C20F1",
"versionEndIncluding": "4.10.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC289B78-75DE-4E4F-939F-6137D3EAADAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "15224A3C-9D36-4745-BC74-93BEB25CA16B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "79F29076-6281-4D7E-85BF-DF9C5156FF37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC77EDF-B784-4993-A574-90190167FE4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78B722B1-9E46-4EEE-89A0-CA22164F10A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BD77CCE8-1DEC-46F2-AC81-735AE6D5F739",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC42F56-9893-4CB7-A379-EB085D342CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D2956E2F-266A-4DDD-8503-3BCB7D380888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "92417164-D89D-45F3-A142-DE62700D4392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1729CA02-8922-4422-A1DB-0A3BC633DFDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F07B17A3-EA29-4958-B622-E0A91CBFE134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7990E6C0-3604-4DB8-9FAE-74D1F351F171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8C289533-5A05-4572-9DBD-4FC329AB27C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CD7CB64F-0A94-402D-A3BC-B36781BAF827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36E8D0AC-BE8F-4ACB-88B2-E30A8C5B07BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4C9BB339-69FC-403B-980D-394F3DFF571E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8C5F3B5E-8DB2-40DB-BDBE-A0254784FD17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D7BA1AF-43F3-4817-9379-17C795A3098D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CA89AC-63BB-4B6D-8CC7-B376D2EBE05C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71455084-3C16-4626-851D-2FCDE37B6A39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6E38E10A-1115-4AAC-B4B2-C776E5EC46EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A68D5AD0-61A5-4F1C-BA85-72BB9B701E1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "09DD97C6-1E03-4730-BE8D-02BA3CF31E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D2DCFB0D-DC51-4FD3-967A-62697ECA27E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9F7F47DB-56FF-4DCB-97C5-7FA2BE027DF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E66B7D7F-86E3-4FEE-9E30-5E3CE4790B30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6507F1E2-BBB9-4564-BAFA-007935A6E5BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3B2185E8-4321-4E9D-8CF9-DEB830B42D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9334E9-821F-455D-A1D0-C1885599C00F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C8B15BC5-04F8-4D30-B196-24BF2EED9F6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "035EDC9B-0D4F-4D01-8C67-0F771D6570D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9978B12C-258F-4137-BBB1-1DBCB22E105B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F7395CC8-6110-4FDF-8EFE-8859A6D267C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCFB9285-B53A-4EE7-BCD5-3C34BE7B5DD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "73B2FE72-7C9D-4A13-AE00-6AA8D4C870C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "083C28F7-2BB3-4278-8064-0A9F67B18B5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9F027E-40BC-4AD3-BD92-E5493CBA5650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "90B78F40-12CE-402C-920F-E99195C85917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1814A3-E27A-4BA8-91C7-80906BBB261E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "72049D4C-762D-4EA4-85F4-983639EA0A38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9520E8B9-0102-4340-BAC0-EB58ACBE37FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DDA28422-D9E4-471A-9BF9-71CDB06B1A65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F4121B4C-F211-4632-9AC8-3E74385F14E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:netscape_portable_runtime:4.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7998B791-8D38-424D-821B-F190CDFF942F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions."
},
{
"lang": "es",
"value": "Mozilla Netscape Portable Runtime (NSPR) anterior a 4.10.6 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (escritura fuera de rango) a trav\u00e9s de vectores que involucren las funciones sprintf y console."
}
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/787.html\n\n\"CWE-787: Out-of-bounds Write\"",
"id": "CVE-2014-1545",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-06-11T10:57:18.220",
"references": [
{
"source": "security@mozilla.org",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"source": "security@mozilla.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"
},
{
"source": "security@mozilla.org",
"url": "http://secunia.com/advisories/58984"
},
{
"source": "security@mozilla.org",
"url": "http://secunia.com/advisories/59229"
},
{
"source": "security@mozilla.org",
"url": "http://secunia.com/advisories/59275"
},
{
"source": "security@mozilla.org",
"url": "http://secunia.com/advisories/59318"
},
{
"source": "security@mozilla.org",
"url": "http://secunia.com/advisories/59377"
},
{
"source": "security@mozilla.org",
"url": "http://secunia.com/advisories/59387"
},
{
"source": "security@mozilla.org",
"url": "http://secunia.com/advisories/59425"
},
{
"source": "security@mozilla.org",
"url": "http://secunia.com/advisories/59486"
},
{
"source": "security@mozilla.org",
"url": "http://secunia.com/advisories/59614"
},
{
"source": "security@mozilla.org",
"url": "http://www.debian.org/security/2014/dsa-2955"
},
{
"source": "security@mozilla.org",
"url": "http://www.debian.org/security/2014/dsa-2960"
},
{
"source": "security@mozilla.org",
"url": "http://www.debian.org/security/2014/dsa-2962"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html"
},
{
"source": "security@mozilla.org",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"source": "security@mozilla.org",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"source": "security@mozilla.org",
"url": "http://www.securityfocus.com/bid/67975"
},
{
"source": "security@mozilla.org",
"url": "http://www.securitytracker.com/id/1030404"
},
{
"source": "security@mozilla.org",
"url": "http://www.ubuntu.com/usn/USN-2265-1"
},
{
"source": "security@mozilla.org",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783"
},
{
"source": "security@mozilla.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432"
},
{
"source": "security@mozilla.org",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/58984"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59229"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59275"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59318"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59387"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59425"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59486"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/59614"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2014/dsa-2955"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2014/dsa-2960"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2014/dsa-2962"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/67975"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1030404"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2265-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201504-01"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…