Heap-based Buffer Overflow in Mozilla Firefox, Thunderbird, and SeaMonkey
CVE-2014-1523
6.5MEDIUM
Key Information:
- Vendor
- Mozilla
- Vendor
- CVE Published:
- 30 April 2014
Summary
A vulnerability in Mozilla's Firefox, Thunderbird, and SeaMonkey products allows remote attackers to exploit a heap-based buffer overflow in the read_u32 function. By providing a specially crafted JPEG image, attackers can trigger an out-of-bounds read, leading to application crashes and denial of service. Users and administrators are encouraged to apply the latest patches to mitigate this vulnerability.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved