Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-1593

Опубликовано: 11 дек. 2014
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
iceweaselfixed31.3.0esr-1package
icedovefixed31.3.0-1package
iceweaselend-of-lifesqueezepackage
icedoveend-of-lifesqueezepackage

EPSS

Процентиль: 83%
0.0211
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

redhat
больше 10 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

nvd
больше 10 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

github
больше 3 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

oracle-oval
больше 10 лет назад

ELSA-2014-1924: thunderbird security update (IMPORTANT)

EPSS

Процентиль: 83%
0.0211
Низкий