Executive Summary

Informations
NameCVE-2014-1551First vendor Publication2014-07-23
VendorCveLast vendor Modification2017-01-06

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in the FontTableRec destructor in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 on Windows allows remote attackers to execute arbitrary code via crafted use of fonts in MathML content, leading to improper handling of a DirectWrite font-face object.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1551

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:25027
 
Oval ID: oval:org.mitre.oval:def:25027
Title: Use-after-free vulnerability in the FontTableRec destructor in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 on Windows allows remote attackers to execute arbitrary code via crafted use of fonts in MathML content, leading to improper handling of a DirectWrite font-face object.
Description: Use-after-free vulnerability in the FontTableRec destructor in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 on Windows allows remote attackers to execute arbitrary code via crafted use of fonts in MathML content, leading to improper handling of a DirectWrite font-face object.
Family: windows Class: vulnerability
Reference(s): CVE-2014-1551
Version: 7
Platform(s): Microsoft Windows Server 2012 R2
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows XP
Product(s): Mozilla Firefox
Mozilla Firefox ESR
Mozilla Thunderbird
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application340
Application10
Application151
Os1

Information Assurance Vulnerability Management (IAVM)

DateDescription
2014-07-24IAVM : 2014-A-0113 - Multiple Vulnerabilities in Mozilla Products
Severity : Category I - VMSKEY : V0053309

Nessus® Vulnerability Scanner

DateDescription
2015-04-08Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201504-01.nasl - Type : ACT_GATHER_INFO
2015-01-19Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_firefox_20141216.nasl - Type : ACT_GATHER_INFO
2014-08-04Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_firefox-201407-140729.nasl - Type : ACT_GATHER_INFO
2014-08-04Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_firefox-201407-140730.nasl - Type : ACT_GATHER_INFO
2014-07-24Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_978b0f76122d11e4afe3bc5ff4fb5e7b.nasl - Type : ACT_GATHER_INFO
2014-07-24Name : The remote Windows host contains a web browser that is affected by multiple v...
File : mozilla_firefox_24_7_esr.nasl - Type : ACT_GATHER_INFO
2014-07-24Name : The remote Windows host contains a web browser that is affected by multiple v...
File : mozilla_firefox_31.nasl - Type : ACT_GATHER_INFO
2014-07-24Name : The remote Windows host contains a mail client that is affected by multiple v...
File : mozilla_thunderbird_24_7.nasl - Type : ACT_GATHER_INFO
2014-07-24Name : The remote Windows host contains a mail client that is affected by multiple v...
File : mozilla_thunderbird_31_0.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
CONFIRM http://www.mozilla.org/security/announce/2014/mfsa2014-59.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1018234
GENTOO https://security.gentoo.org/glsa/201504-01
SECTRACK http://www.securitytracker.com/id/1030619
http://www.securitytracker.com/id/1030620
SECUNIA http://secunia.com/advisories/59760

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
DateInformations
2017-11-22 12:05:56
  • Multiple Updates
2017-01-07 09:25:21
  • Multiple Updates
2016-12-22 09:23:37
  • Multiple Updates
2016-10-04 09:24:03
  • Multiple Updates
2016-06-30 21:37:27
  • Multiple Updates
2016-06-28 22:35:58
  • Multiple Updates
2016-04-27 00:15:38
  • Multiple Updates
2015-04-09 13:28:54
  • Multiple Updates
2015-01-21 13:26:44
  • Multiple Updates
2014-08-05 13:25:52
  • Multiple Updates
2014-07-26 00:20:33
  • Multiple Updates
2014-07-25 13:21:42
  • Multiple Updates
2014-07-23 21:25:02
  • Multiple Updates
2014-07-23 17:22:31
  • First insertion