Heap-based Buffer Overflow in Mozilla Firefox, Thunderbird, and SeaMonkey
CVE-2014-1523

6.5MEDIUM

Key Information:

Vendor
Mozilla
Vendor
CVE Published:
30 April 2014

Summary

A vulnerability in Mozilla's Firefox, Thunderbird, and SeaMonkey products allows remote attackers to exploit a heap-based buffer overflow in the read_u32 function. By providing a specially crafted JPEG image, attackers can trigger an out-of-bounds read, leading to application crashes and denial of service. Users and administrators are encouraged to apply the latest patches to mitigate this vulnerability.

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2014-1523 : Heap-based Buffer Overflow in Mozilla Firefox, Thunderbird, and SeaMonkey | SecurityVulnerability.io