10
CVSSv2

CVE-2014-1486

Published: 06/02/2014 Updated: 03/01/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox prior to 27.0, Firefox ESR 24.x prior to 24.3, Thunderbird prior to 24.3, and SeaMonkey prior to 2.24 allows remote malicious users to execute arbitrary code via vectors involving unspecified Content-Type values for image data.

Affected Products

Vendor Product Versions
MozillaFirefox0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.6.1, 0.7, 0.7.1, 0.8, 0.9, 0.9.1, 0.9.2, 0.9.3, 0.10, 0.10.1, 1.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.5, 1.5.0.1, 1.5.0.2, 1.5.0.3, 1.5.0.4, 1.5.0.5, 1.5.0.6, 1.5.0.7, 1.5.0.8, 1.5.0.9, 1.5.0.10, 1.5.0.11, 1.5.0.12, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.5.6, 1.5.7, 1.5.8, 2.0, 2.0.0.1, 2.0.0.2, 2.0.0.3, 2.0.0.4, 2.0.0.5, 2.0.0.6, 2.0.0.7, 2.0.0.8, 2.0.0.9, 2.0.0.10, 2.0.0.11, 2.0.0.12, 2.0.0.13, 2.0.0.14, 2.0.0.15, 2.0.0.16, 2.0.0.17, 2.0.0.18, 2.0.0.19, 2.0.0.20, 3.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 3.0.19, 3.5, 3.5.1, 3.5.2, 3.5.3, 3.5.4, 3.5.5, 3.5.6, 3.5.7, 3.5.8, 3.5.9, 3.5.10, 3.5.11, 3.5.12, 3.5.13, 3.5.14, 3.5.15, 3.5.16, 3.5.17, 3.5.18, 3.5.19, 3.6, 3.6.2, 3.6.3, 3.6.4, 3.6.6, 3.6.7, 3.6.8, 3.6.9, 3.6.10, 3.6.11, 3.6.12, 3.6.13, 3.6.14, 3.6.15, 3.6.16, 3.6.17, 3.6.18, 3.6.19, 3.6.20, 3.6.21, 3.6.22, 3.6.23, 3.6.24, 3.6.25, 3.6.26, 3.6.27, 3.6.28, 4.0, 4.0.1, 5.0, 5.0.1, 6.0, 6.0.1, 6.0.2, 7.0, 7.0.1, 8.0, 8.0.1, 9.0, 9.0.1, 10.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4, 10.0.5, 10.0.6, 10.0.7, 10.0.8, 10.0.9, 10.0.10, 10.0.11, 10.0.12, 11.0, 12.0, 13.0, 13.0.1, 14.0, 14.0.1, 15.0, 15.0.1, 16.0, 16.0.1, 16.0.2, 17.0.2, 17.0.3, 17.0.4, 17.0.5, 17.0.6, 17.0.7, 17.0.8, 17.0.9, 17.0.10, 17.0.11, 18.0, 18.0.1, 18.0.2, 19.0, 19.0.1, 19.0.2, 20.0, 20.0.1, 21.0, 23.0, 23.0.1, 24.0, 24.1, 24.1.1, 25.0, 25.0.1, 26.0
MozillaFirefox Esr24.0, 24.0.1, 24.0.2, 24.1.0, 24.1.1, 24.2
MozillaSeamonkey2.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.1, 2.2, 2.3, 2.3.1, 2.3.2, 2.3.3, 2.4, 2.4.1, 2.5, 2.6, 2.6.1, 2.7, 2.7.1, 2.7.2, 2.8, 2.9, 2.9.1, 2.10, 2.10.1, 2.11, 2.12, 2.12.1, 2.13, 2.13.1, 2.13.2, 2.14, 2.15, 2.15.1, 2.15.2, 2.16, 2.16.1, 2.16.2, 2.17, 2.17.1, 2.18, 2.19, 2.20, 2.21, 2.22, 2.22.1, 2.23, 2.24
MozillaThunderbird0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.7.1, 0.7.2, 0.7.3, 0.8, 0.9, 1.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.5, 1.5.0.1, 1.5.0.2, 1.5.0.3, 1.5.0.4, 1.5.0.5, 1.5.0.6, 1.5.0.7, 1.5.0.8, 1.5.0.9, 1.5.0.10, 1.5.0.11, 1.5.0.12, 1.5.0.13, 1.5.0.14, 1.5.1, 1.5.2, 1.7.1, 1.7.3, 2.0, 2.0.0.0, 2.0.0.1, 2.0.0.2, 2.0.0.3, 2.0.0.4, 2.0.0.5, 2.0.0.6, 2.0.0.7, 2.0.0.8, 2.0.0.9, 2.0.0.11, 2.0.0.12, 2.0.0.13, 2.0.0.14, 2.0.0.15, 2.0.0.16, 2.0.0.17, 2.0.0.18, 2.0.0.19, 2.0.0.20, 2.0.0.21, 2.0.0.22, 2.0.0.23, 3.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.1, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.1.10, 3.1.11, 3.1.12, 3.1.13, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 5.0, 6.0, 6.0.1, 6.0.2, 7.0, 7.0.1, 8.0, 9.0, 9.0.1, 10.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4, 11.0, 11.0.1, 12.0, 12.0.1, 13.0, 13.0.1, 14.0, 15.0, 15.0.1, 16.0, 16.0.1, 16.0.2, 17.0, 17.0.1, 17.0.2, 17.0.3, 17.0.4, 17.0.5, 17.0.6, 17.0.7, 17.0.8, 24.0, 24.0.1, 24.1, 24.1.1, 24.2

Vendor Advisories

Synopsis Important: thunderbird security update Type/Severity Security Advisory: Important Topic An updated thunderbird package that fixes several security issues is nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingimportant security impact ...
Synopsis Critical: firefox security update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix several security issues are now availablefor Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having criticalsecurity impact Common Vulner ...
Use-after-free with imgRequestProxy and image proccessing Announced February 4, 2014 Reporter Arthur Gerkis Impact Critical Products Firefox, Firefox ESR, SeaMonkey, Thunderbird Fixed in ...
Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 270, Firefox ESR 24x before 243, Thunderbird before 243, and SeaMonkey before 224 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data ...
Several security issues were fixed in Thunderbird ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, use-after-frees, too-verbose error messages and missing permission checks may lead to the execution of arbitrary code, the bypass of security checks or information disclosure This update also addresses security ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
USN-2102-1 introduced a regression in Firefox ...
Oracle Solaris Third Party Bulletin - April 2016 Description The Oracle Solaris Third Party Bulletin announces patches for one or more security vulnerabilities fixed in third party software that is included in Oracle Solaris distributions Starting January 20, 2015, Third Party Bulletins are released on the same day when Oracle Critical Patch Upda ...

References

CWE-399http://download.novell.com/Download?buildid=VYQsgaFpQ2khttp://download.novell.com/Download?buildid=Y2fux-JW1Qchttp://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.htmlhttp://osvdb.org/102872http://rhn.redhat.com/errata/RHSA-2014-0132.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0133.htmlhttp://secunia.com/advisories/56706http://secunia.com/advisories/56761http://secunia.com/advisories/56763http://secunia.com/advisories/56767http://secunia.com/advisories/56787http://secunia.com/advisories/56858http://secunia.com/advisories/56888http://secunia.com/advisories/56922http://www.debian.org/security/2014/dsa-2858http://www.mozilla.org/security/announce/2014/mfsa2014-08.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.securityfocus.com/bid/65334http://www.securitytracker.com/id/1029717http://www.securitytracker.com/id/1029720http://www.securitytracker.com/id/1029721http://www.ubuntu.com/usn/USN-2102-1http://www.ubuntu.com/usn/USN-2102-2http://www.ubuntu.com/usn/USN-2119-1https://8pecxstudios.com/?page_id=44080https://bugzilla.mozilla.org/show_bug.cgi?id=942164https://exchange.xforce.ibmcloud.com/vulnerabilities/90890https://security.gentoo.org/glsa/201504-01https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2014-1486https://access.redhat.com/errata/RHSA-2014:0133https://nvd.nist.govhttps://usn.ubuntu.com/2119-1/https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2014-0133