7.5
CVSSv2

CVE-2014-8634

Published: 14/01/2015 Updated: 08/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox prior to 35.0, Firefox ESR 31.x prior to 31.4, Thunderbird prior to 31.4, and SeaMonkey prior to 2.32 allow remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox esr 31.0

mozilla firefox esr 31.3.0

mozilla firefox esr 31.2

mozilla firefox esr 31.1.1

mozilla firefox esr 31.1.0

mozilla firefox

mozilla seamonkey

mozilla thunderbird

Vendor Advisories

Synopsis Critical: firefox security and bug fix update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix multiple security issues and one bug arenow available for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Critical securityim ...
Synopsis Important: thunderbird security update Type/Severity Security Advisory: Important Topic An updated thunderbird package that fixes three security issues is nowavailable for Red Hat Enterprise Linux 5 and 6Red Hat Product Security has rated this update as having Important securityimpact Common Vuln ...
Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client: Multiple memory safety errors and implementation errors may lead to the execution of arbitrary code, information leaks or denial of service For the stable distribution (wheezy), these problems have been fixed in version 3140-1~d ...
Several security issues were fixed in Thunderbird ...
USN-2458-1 introduced a regression in Firefox ...
This update provides compatible packages for Firefox 35 ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Mozilla Foundation Security Advisory 2015-01 Miscellaneous memory safety hazards (rv:350 / rv:314) Announced January 13, 2015 Reporter Mozilla Developers Impact Critical Products Firefox, Firefox ESR, Firefox OS, SeaMonkey, ...
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 350, Firefox ESR 31x before 314, Thunderbird before 314, and SeaMonkey before 232 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors ...

Recent Articles

Firefox 35 stamps out critical bugs
The Register • Darren Pauli • 19 Jan 2015

Nine flaws scrubbed out

Mozilla has crushed nine bugs, some rather dangerous, in the latest version of its flagship browser. The fixes include a patch for a critical sandbox escape (CVE-2014-8643) in the Gecko Media Plugin used for h.264 video playback affecting Windows machines (but not OS X or Linux). Another critical hole addressed a read-after-free flaw (CVE-2014-8641) in WebRTC that affected Firefox and SeaMonkey and pertains to the way tracks are handled, leading to an exploitable crash or incorrect behaviour. A ...

References

NVD-CWE-noinfohttps://bugzilla.mozilla.org/show_bug.cgi?id=1109889https://bugzilla.mozilla.org/show_bug.cgi?id=1111737http://www.mozilla.org/security/announce/2014/mfsa2015-01.htmlhttp://secunia.com/advisories/62242http://secunia.com/advisories/62250http://www.securitytracker.com/id/1031533http://secunia.com/advisories/62237http://www.securityfocus.com/bid/72049http://secunia.com/advisories/62446http://secunia.com/advisories/62790http://secunia.com/advisories/62657http://www.debian.org/security/2015/dsa-3127http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0046.htmlhttp://www.debian.org/security/2015/dsa-3132http://www.ubuntu.com/usn/USN-2460-1http://rhn.redhat.com/errata/RHSA-2015-0047.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlhttps://security.gentoo.org/glsa/201504-01http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.htmlhttp://www.securitytracker.com/id/1031534http://secunia.com/advisories/62418http://secunia.com/advisories/62316http://secunia.com/advisories/62315http://secunia.com/advisories/62313http://secunia.com/advisories/62304http://secunia.com/advisories/62293http://secunia.com/advisories/62283http://secunia.com/advisories/62274http://secunia.com/advisories/62273http://secunia.com/advisories/62259http://secunia.com/advisories/62253http://linux.oracle.com/errata/ELSA-2015-0047.htmlhttp://linux.oracle.com/errata/ELSA-2015-0046.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/99955https://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2015:0046https://usn.ubuntu.com/2460-1/https://access.redhat.com/security/cve/cve-2014-8634https://www.debian.org/security/./dsa-3132