Severity
8.8HIGH
EPSS
1.6%
top 18.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 19
Latest updateMay 13

Description

TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages10 packages

NVDmozilla/firefox24.024.4+1
NVDmozilla/seamonkey< 2.25
NVDopensuse/opensuse11.4, 12.3, 13.1+2

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 12.04, 12.10, 13.10, Enterprise Linux 6.5

🔴Vulnerability Details

2
GHSA
GHSA-jcgc-g2q4-pjwr: TypedArrayObject2022-05-13
CVEList
CVE-2014-1513: TypedArrayObject2014-03-19

📋Vendor Advisories

3
Ubuntu
Thunderbird vulnerabilities2014-03-21
Red Hat
Mozilla: Out-of-bounds read/write through neutering ArrayBuffer objects (MFSA 2014-31)2014-03-18
Ubuntu
Firefox vulnerabilities2014-03-18

💬Community

2
Bugzilla
CVE-2014-3650 JBoss AeroGear: stored XSS via deviceToken2014-09-19
Bugzilla
CVE-2014-1513 Mozilla: Out-of-bounds read/write through neutering ArrayBuffer objects (MFSA 2014-31)2014-03-18