TypedArrayObject.cpp in Mozilla Firefox prior to 28.0, Firefox ESR 24.x prior to 24.4, Thunderbird prior to 24.4, and SeaMonkey prior to 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote malicious users to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox |
||
mozilla firefox esr |
||
mozilla seamonkey |
||
mozilla thunderbird |
||
debian debian linux 7.0 |
||
debian debian linux 8.0 |
||
suse suse linux enterprise software development kit 11.0 |
||
opensuse opensuse 11.4 |
||
opensuse opensuse 12.3 |
||
opensuse opensuse 13.1 |
||
suse suse linux enterprise desktop 11 |
||
suse suse linux enterprise server 11 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux eus 6.5 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux server aus 6.5 |
||
redhat enterprise linux server eus 6.5 |
||
redhat enterprise linux server tus 6.5 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux workstation 6.0 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 12.10 |
||
canonical ubuntu linux 13.10 |