Vulnerability Description
Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 29.0 |
| Mozilla | Seamonkey | < 2.26 |
| Mozilla | Thunderbird | < 24.5 |
| Fedoraproject | Fedora | 19 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 12.04 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 6.5 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Server Aus | 6.5 |
| Redhat | Enterprise Linux Server Eus | 6.5 |
| Redhat | Enterprise Linux Server Tus | 6.5 |
| Redhat | Enterprise Linux Workstation | 5.0 |
| Opensuse | Opensuse | 11.4 |
| Suse | Suse Linux Enterprise Server | 10 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.htmlMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0448.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0449.htmlThird Party Advisory
- http://www.debian.org/security/2014/dsa-2918Third Party Advisory
- http://www.debian.org/security/2014/dsa-2924Third Party Advisory
- http://www.mozilla.org/security/announce/2014/mfsa2014-37.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
- http://www.securityfocus.com/bid/67129Third Party AdvisoryVDB Entry
FAQ
What is CVE-2014-1523?
CVE-2014-1523 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a ...
How severe is CVE-2014-1523?
CVE-2014-1523 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1523?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Fedoraproject Fedora, Debian Debian Linux.