Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-1562 | First vendor Publication | 2014-09-03 |
Vendor | Cve | Last vendor Modification | 2017-01-07 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:26152 | |||
Oval ID: | oval:org.mitre.oval:def:26152 | ||
Title: | SUSE-SU-2014:1120-1 -- Security update for MozillaFirefox | ||
Description: | Mozilla Firefox was updated to the 24.8.0ESR release, fixing security issues and bugs. Only some of the published security advisories affect the Mozilla Firefox 24ESR codestream: * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free during text layout when interacting with the setting of text direction. This results in a use-after-free which can lead to arbitrary code execution. * MFSA 2014-67: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. * Jan de Mooij reported a memory safety problem that affects Firefox ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562) More information is referenced on: https://www.mozilla.org/security/announce/ <https://www.mozilla.org/security/announce/> . Security Issues: * CVE-2014-1567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567> * CVE-2014-1562 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1120-1 CVE-2014-1567 CVE-2014-1562 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 | Product(s): | MozillaFirefox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26273 | |||
Oval ID: | oval:org.mitre.oval:def:26273 | ||
Title: | SUSE-SU-2014:1112-2 -- Security update for MozillaFirefox | ||
Description: | Mozilla Firefox was updated to the 24.8.0ESR release, fixing security issues and bugs. Only some of the published security advisories affect the Mozilla Firefox 24ESR codestream: * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free during text layout when interacting with the setting of text direction. This results in a use-after-free which can lead to arbitrary code execution. * MFSA 2014-67: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. * Jan de Mooij reported a memory safety problem that affects Firefox ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562) More information is referenced on: https://www.mozilla.org/security/announce/ <https://www.mozilla.org/security/announce/> . Security Issues: * CVE-2014-1562 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562> * CVE-2014-1567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1112-2 CVE-2014-1567 CVE-2014-1562 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | MozillaFirefox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26608 | |||
Oval ID: | oval:org.mitre.oval:def:26608 | ||
Title: | SUSE-SU-2014:1112-1 -- Security update for MozillaFirefox | ||
Description: | Mozilla Firefox was updated to the 24.8.0ESR release, fixing security issues and bugs. Only some of the published security advisories affect the Mozilla Firefox 24ESR codestream: * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free during text layout when interacting with the setting of text direction. This results in a use-after-free which can lead to arbitrary code execution. * MFSA 2014-67: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. * Jan de Mooij reported a memory safety problem that affects Firefox ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562) More information is referenced on: https://www.mozilla.org/security/announce/ <https://www.mozilla.org/security/announce/> . Security Issues: * CVE-2014-1562 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562> * CVE-2014-1567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1112-1 CVE-2014-1567 CVE-2014-1562 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | MozillaFirefox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26699 | |||
Oval ID: | oval:org.mitre.oval:def:26699 | ||
Title: | SUSE-SU-2014:1107-1 -- Security update for MozillaFirefox | ||
Description: | Mozilla Firefox was updated to the 24.8.0ESR release, fixing security issues and bugs. Only some of the published security advisories affect the Mozilla Firefox 24ESR codestream: * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free during text layout when interacting with the setting of text direction. This results in a use-after-free which can lead to arbitrary code execution. * MFSA 2014-67: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. * Jan de Mooij reported a memory safety problem that affects Firefox ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562) More information is referenced on: https://www.mozilla.org/security/announce/ <https://www.mozilla.org/security/announce/> . Security Issues: * CVE-2014-1562 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562> * CVE-2014-1567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1107-1 CVE-2014-1567 CVE-2014-1562 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | MozillaFirefox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26775 | |||
Oval ID: | oval:org.mitre.oval:def:26775 | ||
Title: | SUSE-SU-2014:1120-2 -- Security update for MozillaFirefox | ||
Description: | Mozilla Firefox was updated to the 24.8.0ESR release, fixing security issues and bugs. Only some of the published security advisories affect the Mozilla Firefox 24ESR codestream: * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free during text layout when interacting with the setting of text direction. This results in a use-after-free which can lead to arbitrary code execution. * MFSA 2014-67: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. * Jan de Mooij reported a memory safety problem that affects Firefox ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562) More information is referenced on: https://www.mozilla.org/security/announce/ <https://www.mozilla.org/security/announce/> . Security Issues: * CVE-2014-1567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567> * CVE-2014-1562 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1120-2 CVE-2014-1567 CVE-2014-1562 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 | Product(s): | MozillaFirefox |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-04-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201504-01.nasl - Type : ACT_GATHER_INFO |
2014-09-19 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3028.nasl - Type : ACT_GATHER_INFO |
2014-09-12 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2330-1.nasl - Type : ACT_GATHER_INFO |
2014-09-11 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-531.nasl - Type : ACT_GATHER_INFO |
2014-09-11 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-530.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_firefox-201409-140903.nasl - Type : ACT_GATHER_INFO |
2014-09-05 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140903_thunderbird_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-09-05 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140903_firefox_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-09-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3018.nasl - Type : ACT_GATHER_INFO |
2014-09-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1145.nasl - Type : ACT_GATHER_INFO |
2014-09-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1144.nasl - Type : ACT_GATHER_INFO |
2014-09-04 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2014-1145.nasl - Type : ACT_GATHER_INFO |
2014-09-04 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1144.nasl - Type : ACT_GATHER_INFO |
2014-09-04 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2014-1145.nasl - Type : ACT_GATHER_INFO |
2014-09-04 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1144.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_firefox_24_8_esr.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2329-1.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Windows host contains a mail client that is affected by multiple v... File : mozilla_thunderbird_31_1.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Windows host contains a mail client that is affected by multiple v... File : mozilla_thunderbird_24_8.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_32.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_31_1_esr.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_24_8_esr.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Mac OS X host contains a mail client that is affected by multiple ... File : macosx_thunderbird_31_1.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Mac OS X host contains a mail client that is affected by multiple ... File : macosx_thunderbird_24_8.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_firefox_32.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_firefox_31_1_esr.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-02-10 01:24:22 |
|
2024-02-02 01:26:33 |
|
2024-02-01 12:07:52 |
|
2023-09-05 12:25:08 |
|
2023-09-05 01:07:46 |
|
2023-09-02 12:25:07 |
|
2023-09-02 01:07:52 |
|
2023-08-12 12:27:22 |
|
2023-08-12 01:07:22 |
|
2023-08-11 12:23:15 |
|
2023-08-11 01:07:33 |
|
2023-08-06 12:22:37 |
|
2023-08-06 01:07:21 |
|
2023-08-04 12:22:39 |
|
2023-08-04 01:07:25 |
|
2023-07-14 12:22:37 |
|
2023-07-14 01:07:23 |
|
2023-04-01 01:19:07 |
|
2023-03-29 01:24:32 |
|
2023-03-28 12:07:45 |
|
2022-10-11 12:20:25 |
|
2022-10-11 01:07:32 |
|
2021-05-04 12:30:00 |
|
2021-04-22 01:36:16 |
|
2020-10-14 01:10:49 |
|
2020-10-03 01:10:55 |
|
2020-05-29 01:09:59 |
|
2020-05-23 01:51:14 |
|
2020-05-23 00:40:01 |
|
2018-12-04 12:05:42 |
|
2018-01-18 12:05:58 |
|
2017-11-22 12:05:56 |
|
2017-01-07 09:25:22 |
|
2016-12-24 09:24:01 |
|
2016-12-22 09:23:37 |
|
2016-10-04 09:24:03 |
|
2016-06-28 22:36:06 |
|
2016-04-27 00:15:51 |
|
2015-04-09 13:28:56 |
|
2015-03-18 09:26:28 |
|
2014-11-14 13:27:33 |
|
2014-09-20 13:25:15 |
|
2014-09-13 13:43:04 |
|
2014-09-12 13:27:14 |
|
2014-09-11 13:25:41 |
|
2014-09-06 13:24:34 |
|
2014-09-05 13:24:18 |
|
2014-09-04 13:24:38 |
|
2014-09-03 21:23:51 |
|
2014-09-03 17:21:57 |
|