CVE-2014-1567
Summary
| CVE | CVE-2014-1567 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-09-03 10:55:00 UTC |
| Updated | 2017-01-07 02:59:00 UTC |
| Description | Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Mozilla | Firefox | 30.0 | All | All | All |
| Application | Mozilla | Firefox | 31.0 | All | All | All |
| Application | Mozilla | Firefox | 30.0 | All | All | All |
| Application | Mozilla | Firefox | 31.0 | All | All | All |
| Application | Mozilla | Firefox | All | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0.1 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0.2 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.1.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.1.1 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.2 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.3 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.4 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.5 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.6 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.7 | All | All | All |
| Application | Mozilla | Firefox Esr | 31.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0.1 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.0.2 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.1.0 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.1.1 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.2 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.3 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.4 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.5 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.6 | All | All | All |
| Application | Mozilla | Firefox Esr | 24.7 | All | All | All |
| Application | Mozilla | Firefox Esr | 31.0 | All | All | All |
| Application | Mozilla | Thunderbird | 24.0 | All | All | All |
| Application | Mozilla | Thunderbird | 24.0.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.1.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.2 | All | All | All |
| Application | Mozilla | Thunderbird | 24.3 | All | All | All |
| Application | Mozilla | Thunderbird | 24.4 | All | All | All |
| Application | Mozilla | Thunderbird | 24.5 | All | All | All |
| Application | Mozilla | Thunderbird | 24.6 | All | All | All |
| Application | Mozilla | Thunderbird | 24.7 | All | All | All |
| Application | Mozilla | Thunderbird | 31.0 | All | All | All |
| Application | Mozilla | Thunderbird | 24.0 | All | All | All |
| Application | Mozilla | Thunderbird | 24.0.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.1.1 | All | All | All |
| Application | Mozilla | Thunderbird | 24.2 | All | All | All |
| Application | Mozilla | Thunderbird | 24.3 | All | All | All |
| Application | Mozilla | Thunderbird | 24.4 | All | All | All |
| Application | Mozilla | Thunderbird | 24.5 | All | All | All |
| Application | Mozilla | Thunderbird | 24.6 | All | All | All |
| Application | Mozilla | Thunderbird | 24.7 | All | All | All |
| Application | Mozilla | Thunderbird | 31.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Oracle Solaris Bulletin - April 2016 | CONFIRM | www.oracle.com | |
| Mozilla Firefox/Thunderbird CVE-2014-1567 Use After Free Memory Corruption Vulnerability | BID | www.securityfocus.com | |
| Mozilla Thunderbird Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information - SecurityTracker | SECTRACK | www.securitytracker.com | |
| openSUSE-SU-2014:1099-1: moderate: MozillaFirefox to Firefox 32 | SUSE | lists.opensuse.org | |
| Gentoo Security | GENTOO | security.gentoo.org | |
| Security Advisory SA60186 - Mozilla Firefox ESR Two Vulnerabilities - Secunia | SECUNIA | secunia.com | |
| [security-announce] openSUSE-SU-2015:1266-1: important: Mozilla (Firefox | SUSE | lists.opensuse.org | |
| Access Denied | CONFIRM | bugzilla.mozilla.org | |
| Debian -- Security Information -- DSA-3028-1 icedove | DEBIAN | www.debian.org | |
| [security-announce] SUSE-SU-2014:1112-1: important: Security update for | SUSE | lists.opensuse.org | |
| [security-announce] SUSE-SU-2014:1107-1: important: Security update for | SUSE | lists.opensuse.org | |
| [security-announce] SUSE-SU-2014:1120-1: important: Security update for | SUSE | lists.opensuse.org | |
| Debian -- Security Information -- DSA-3018-1 iceweasel | DEBIAN | www.debian.org | |
| Security Advisory SA61114 - Ubuntu update for thunderbird - Secunia | SECUNIA | secunia.com | |
| MFSA 2014-72: Use-after-free setting text directionality | CONFIRM | www.mozilla.org | Vendor Advisory |
| [security-announce] openSUSE-SU-2015:0138-1: important: Firefox update t | SUSE | lists.opensuse.org | |
| [security-announce] openSUSE-SU-2014:1098-1: important: MozillaThunderbi | SUSE | lists.opensuse.org | |
| Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Security Advisory SA60148 - Mozilla Firefox ESR / Thunderbird Multiple Vulnerabilities - Secunia | SECUNIA | secunia.com | |
| Security Advisory SA61390 - Debian update for icedove - Secunia | SECUNIA | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.