CVE-2014-1513

Publication date 18 March 2014

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.8 · High

Score breakdown

TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.

Status

Package Ubuntu Release Status
firefox 13.10 saucy
Fixed 28.0+build2-0ubuntu0.13.10.1
12.10 quantal
Fixed 28.0+build2-0ubuntu0.12.10.1
12.04 LTS precise
Fixed 28.0+build2-0ubuntu0.12.04.1
10.04 LTS lucid Ignored end of life
thunderbird 13.10 saucy
Fixed 1:24.4.0+build1-0ubuntu0.13.10.2
12.10 quantal
Fixed 1:24.4.0+build1-0ubuntu0.12.10.1
12.04 LTS precise
Fixed 1:24.4.0+build1-0ubuntu0.12.04.1
10.04 LTS lucid Ignored end of life

Severity score breakdown

Parameter Value
Base score 8.8 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-2151-1
    • Thunderbird vulnerabilities
    • 21 March 2014
    • USN-2150-1
    • Firefox vulnerabilities
    • 18 March 2014

Other references