CVE-2014-1562
Summary
| CVE | CVE-2014-1562 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-09-03 10:55:00 UTC |
| Updated | 2017-01-07 02:59:00 UTC |
| Description | Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. |
Risk And Classification
Problem Types: CWE-119 | NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Mozilla | Firefox | 30.0 | All | All | All |
| Application | Mozilla | Firefox | 31.0 | All | All | All |
| Application | Mozilla | Firefox | 30.0 | All | All | All |
| Application | Mozilla | Firefox | 31.0 | All | All | All |
| Application | Mozilla | Firefox | All | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0.1 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0.2 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.1.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.1.1 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.2 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.3 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.4 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.5 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.6 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.7 | All | All | All |
| Application | Mozilla | Firefox Esr | 31.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0.1 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0.2 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.1.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.1.1 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.2 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.3 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.4 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.5 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.6 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.7 | All | All | All |
| Application | Mozilla | Firefox Esr | 31.0 | All | All | All |
| Application | Mozilla | Thunderbird | 24.0 | All | All | All |
| Application | Mozilla | Thunderbird | 24.0.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.1.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.2 | All | All | All |
| Application | Mozilla | Thunderbird | 24.3 | All | All | All |
| Application | Mozilla | Thunderbird | 24.4 | All | All | All |
| Application | Mozilla | Thunderbird | 24.5 | All | All | All |
| Application | Mozilla | Thunderbird | 24.6 | All | All | All |
| Application | Mozilla | Thunderbird | 24.7 | All | All | All |
| Application | Mozilla | Thunderbird | 31.0 | All | All | All |
| Application | Mozilla | Thunderbird | 24.0 | All | All | All |
| Application | Mozilla | Thunderbird | 24.0.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.1.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.2 | All | All | All |
| Application | Mozilla | Thunderbird | 24.3 | All | All | All |
| Application | Mozilla | Thunderbird | 24.4 | All | All | All |
| Application | Mozilla | Thunderbird | 24.5 | All | All | All |
| Application | Mozilla | Thunderbird | 24.6 | All | All | All |
| Application | Mozilla | Thunderbird | 24.7 | All | All | All |
| Application | Mozilla | Thunderbird | 31.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Oracle Solaris Bulletin - April 2016 | CONFIRM | www.oracle.com | |
| Mozilla Thunderbird Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information - SecurityTracker | SECTRACK | www.securitytracker.com | |
| openSUSE-SU-2014:1099-1: moderate: MozillaFirefox to Firefox 32 | SUSE | lists.opensuse.org | |
| Gentoo Security | GENTOO | security.gentoo.org | |
| Security Advisory SA60186 - Mozilla Firefox ESR Two Vulnerabilities - Secunia | SECUNIA | secunia.com | |
| [security-announce] openSUSE-SU-2015:1266-1: important: Mozilla (Firefox | SUSE | lists.opensuse.org | |
| Debian -- Security Information -- DSA-3028-1 icedove | DEBIAN | www.debian.org | |
| [security-announce] SUSE-SU-2014:1112-1: important: Security update for | SUSE | lists.opensuse.org | |
| [security-announce] SUSE-SU-2014:1107-1: important: Security update for | SUSE | lists.opensuse.org | |
| [security-announce] SUSE-SU-2014:1120-1: important: Security update for | SUSE | lists.opensuse.org | |
| Debian -- Security Information -- DSA-3018-1 iceweasel | DEBIAN | www.debian.org | |
| MFSA 2014-67: Miscellaneous memory safety hazards (rv:32.0 / rv:31.1 / rv:24.8) | CONFIRM | www.mozilla.org | Vendor Advisory |
| Security Advisory SA61114 - Ubuntu update for thunderbird - Secunia | SECUNIA | secunia.com | |
| [security-announce] openSUSE-SU-2015:0138-1: important: Firefox update t | SUSE | lists.opensuse.org | |
| [security-announce] openSUSE-SU-2014:1098-1: important: MozillaThunderbi | SUSE | lists.opensuse.org | |
| Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Security Advisory SA60148 - Mozilla Firefox ESR / Thunderbird Multiple Vulnerabilities - Secunia | SECUNIA | secunia.com | |
| Access Denied | CONFIRM | bugzilla.mozilla.org | |
| Mozilla Firefox/Thunderbird CVE-2014-1562 Multiple Memory Corruption Vulnerabilities | BID | www.securityfocus.com | |
| Security Advisory SA61390 - Debian update for icedove - Secunia | SECUNIA | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.