CVE-2014-1508

CWE-125Out-of-bounds Read7 documents6 sources
Severity
9.1CRITICAL
EPSS
1.0%
top 23.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 19
Latest updateMay 13

Description

The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages10 packages

NVDmozilla/firefox24.024.4+1
NVDmozilla/seamonkey< 2.25
NVDopensuse/opensuse11.4, 12.3, 13.1+2

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 12.04, 12.10, 13.10, Enterprise Linux 6.5

🔴Vulnerability Details

2
GHSA
GHSA-rfxc-hv24-2vh5: The libxul2022-05-13
CVEList
CVE-2014-1508: The libxul2014-03-19

📋Vendor Advisories

3
Ubuntu
Thunderbird vulnerabilities2014-03-21
Red Hat
Mozilla: Information disclosure through polygon rendering in MathML (MFSA 2014-26)2014-03-18
Ubuntu
Firefox vulnerabilities2014-03-18

💬Community

1
Bugzilla
CVE-2014-1508 Mozilla: Information disclosure through polygon rendering in MathML (MFSA 2014-26)2014-03-17