{"api_version":"1","generated_at":"2026-05-01T19:25:49+00:00","cve":"CVE-2014-1565","urls":{"html":"https://cve.report/CVE-2014-1565","api":"https://cve.report/api/cve/CVE-2014-1565.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-1565","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-1565"},"summary":{"title":"CVE-2014-1565","description":"The mozilla::dom::AudioEventTimeline function in the Web Audio API implementation in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 does not properly create audio timelines, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted API calls.","state":"PUBLIC","assigner":"security@mozilla.org","published_at":"2014-09-03 10:55:00","updated_at":"2017-01-07 02:59:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","refsource":"CONFIRM","tags":[],"title":"Oracle Solaris Bulletin - April 2016","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047831","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047831","refsource":"CONFIRM","tags":[],"title":"Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1030794","name":"1030794","refsource":"SECTRACK","tags":[],"title":"Mozilla Thunderbird Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html","name":"openSUSE-SU-2014:1099","refsource":"SUSE","tags":[],"title":"openSUSE-SU-2014:1099-1: moderate: MozillaFirefox to Firefox 32","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/201504-01","name":"GLSA-201504-01","refsource":"GENTOO","tags":[],"title":"Gentoo Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","name":"openSUSE-SU-2015:1266","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2015:1266-1: important: Mozilla (Firefox","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61114","name":"61114","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA61114 - Ubuntu update for thunderbird - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html","name":"openSUSE-SU-2015:0138","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2015:0138-1: important: Firefox update t","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html","name":"openSUSE-SU-2014:1098","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2014:1098-1: important: MozillaThunderbi","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1030793","name":"1030793","refsource":"SECTRACK","tags":[],"title":"Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mozilla.org/security/announce/2014/mfsa2014-70.html","name":"http://www.mozilla.org/security/announce/2014/mfsa2014-70.html","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"MFSA 2014-70: Out-of-bounds read in Web Audio audio timeline","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60148","name":"60148","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA60148 - Mozilla Firefox ESR / Thunderbird Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/69521","name":"69521","refsource":"BID","tags":[],"title":"Mozilla Firefox/Thunderbird CVE-2014-1565 Out of Bounds Memory Corruption Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-1565","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1565","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"1565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"30.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"1565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"31.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"1565","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"30.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"1565","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"31.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"1565","vulnerable":"1","versionEndIncluding":"31.1.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"1565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"31.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"1565","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"31.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"1565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"31.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"1565","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"31.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@mozilla.org","ID":"CVE-2014-1565","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The mozilla::dom::AudioEventTimeline function in the Web Audio API implementation in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 does not properly create audio timelines, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted API calls."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"openSUSE-SU-2015:0138","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"},{"name":"69521","refsource":"BID","url":"http://www.securityfocus.com/bid/69521"},{"name":"http://www.mozilla.org/security/announce/2014/mfsa2014-70.html","refsource":"CONFIRM","url":"http://www.mozilla.org/security/announce/2014/mfsa2014-70.html"},{"name":"GLSA-201504-01","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201504-01"},{"name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"name":"1030794","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1030794"},{"name":"openSUSE-SU-2015:1266","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"name":"openSUSE-SU-2014:1098","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html"},{"name":"60148","refsource":"SECUNIA","url":"http://secunia.com/advisories/60148"},{"name":"openSUSE-SU-2014:1099","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html"},{"name":"61114","refsource":"SECUNIA","url":"http://secunia.com/advisories/61114"},{"name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047831","refsource":"CONFIRM","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047831"},{"name":"1030793","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1030793"}]}},"nvd":{"publishedDate":"2014-09-03 10:55:00","lastModifiedDate":"2017-01-07 02:59:00","problem_types":["CWE-119"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndIncluding":"31.1.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"1565","Ordinal":"68398","Title":"CVE-2014-1565","CVE":"CVE-2014-1565","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"1565","Ordinal":"1","NoteData":"The mozilla::dom::AudioEventTimeline function in the Web Audio API implementation in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 does not properly create audio timelines, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted API calls.","Type":"Description","Title":null},{"CveYear":"2014","CveId":"1565","Ordinal":"2","NoteData":"2014-09-03","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"1565","Ordinal":"3","NoteData":"2017-01-04","Type":"Other","Title":"Modified"}]}}}