6.8
CVSSv2

CVE-2014-1593

Published: 11/12/2014 Updated: 24/12/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox prior to 34.0, Firefox ESR 31.x prior to 31.3, Thunderbird prior to 31.3, and SeaMonkey prior to 2.31 allows remote malicious users to execute arbitrary code via crafted media content.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox esr

mozilla thunderbird

mozilla seamonkey

mozilla firefox

Vendor Advisories

Several security issues were fixed in Thunderbird ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client: Multiple memory safety errors, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, the bypass of security restrictions or denial of service For the stable distribution (wh ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, the bypass of security restrictions or denial of service For the stable distribution (wheezy), thes ...
Mozilla Foundation Security Advisory 2014-88 Buffer overflow while parsing media content Announced December 2, 2014 Reporter Abhishek Arya Impact Critical Products Firefox, Firefox ESR, Firefox OS, SeaMonkey, Thunderbird ...