9.3
CVSSv2

CVE-2014-1513

Published: 19/03/2014 Updated: 11/08/2020
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 829
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

TypedArrayObject.cpp in Mozilla Firefox prior to 28.0, Firefox ESR 24.x prior to 24.4, Thunderbird prior to 24.4, and SeaMonkey prior to 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote malicious users to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla firefox esr

mozilla seamonkey

mozilla thunderbird

debian debian linux 7.0

debian debian linux 8.0

suse suse linux enterprise software development kit 11.0

opensuse opensuse 11.4

opensuse opensuse 12.3

opensuse opensuse 13.1

suse suse linux enterprise desktop 11

suse suse linux enterprise server 11

redhat enterprise linux desktop 5.0

redhat enterprise linux desktop 6.0

redhat enterprise linux eus 6.5

redhat enterprise linux server 5.0

redhat enterprise linux server 6.0

redhat enterprise linux server aus 6.5

redhat enterprise linux server eus 6.5

redhat enterprise linux server tus 6.5

redhat enterprise linux workstation 5.0

redhat enterprise linux workstation 6.0

canonical ubuntu linux 12.04

canonical ubuntu linux 12.10

canonical ubuntu linux 13.10

Vendor Advisories

Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, out of bound reads, use-after-frees and other implementation errors may lead to the execution of arbitrary code, information disclosure, denial of service For the stable distribution (wheezy), these problems ha ...
Several security issues were fixed in Thunderbird ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Mozilla Foundation Security Advisory 2014-31 Out-of-bounds read/write through neutering ArrayBuffer objects Announced March 18, 2014 Reporter Jüri Aedla Impact Critical Products Firefox, Firefox ESR, SeaMonkey, Thunderbird ...