CVE-2014-1524Classic Buffer Overflow in Mozilla Firefox

Severity
9.8CRITICALNVD
EPSS
6.4%
top 8.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 30
Latest updateMay 13

Description

The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages10 packages

NVDmozilla/firefox24.024.5+1
Ubuntumozilla/firefox< 29.0+build1-0ubuntu0.14.04.2
NVDmozilla/seamonkey< 2.26
Ubuntumozilla/thunderbird< 1:24.5.0+build1-0ubuntu0.14.04.1

Also affects: Debian Linux 7.0, 8.0, Fedora 19, 20, Ubuntu Linux 12.04, 12.10, 13.10, 14.04, Enterprise Linux 6.5

🔴Vulnerability Details

3
GHSA
GHSA-c496-q9f8-gv47: The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 292022-05-13
CVEList
CVE-2014-1524: The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 292014-04-30
OSV
CVE-2014-1524: The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 292014-04-29

📋Vendor Advisories

3
Ubuntu
Thunderbird vulnerabilities2014-04-30
Ubuntu
Firefox vulnerabilities2014-04-29
Red Hat
Mozilla: Buffer overflow when using non-XBL object as XBL (MFSA 2014-38)2014-04-29

💬Community

1
Bugzilla
CVE-2014-1524 Mozilla: Buffer overflow when using non-XBL object as XBL (MFSA 2014-38)2014-04-29
CVE-2014-1524 — Classic Buffer Overflow in Mozilla | cvebase