Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox prior to 35.0, Firefox ESR 31.x prior to 31.4, and SeaMonkey prior to 2.32 allows remote malicious users to execute arbitrary code via crafted track data.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla seamonkey |
||
mozilla firefox esr 31.2 |
||
mozilla firefox esr 31.1.1 |
||
mozilla firefox esr 31.3.0 |
||
mozilla firefox esr 31.1.0 |
||
mozilla firefox esr 31.0 |
||
mozilla firefox |
Nine flaws scrubbed out
Mozilla has crushed nine bugs, some rather dangerous, in the latest version of its flagship browser. The fixes include a patch for a critical sandbox escape (CVE-2014-8643) in the Gecko Media Plugin used for h.264 video playback affecting Windows machines (but not OS X or Linux). Another critical hole addressed a read-after-free flaw (CVE-2014-8641) in WebRTC that affected Firefox and SeaMonkey and pertains to the way tracks are handled, leading to an exploitable crash or incorrect behaviour. A ...