Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-1576

Опубликовано: 14 окт. 2014
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5thunderbirdAffected
Red Hat Enterprise Linux 6thunderbirdAffected
Red Hat Enterprise Linux 5firefoxFixedRHSA-2014:163515.10.2014
Red Hat Enterprise Linux 6firefoxFixedRHSA-2014:163515.10.2014
Red Hat Enterprise Linux 7firefoxFixedRHSA-2014:163515.10.2014
Red Hat Enterprise Linux 7xulrunnerFixedRHSA-2014:163515.10.2014

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1152358Mozilla: Buffer overflow during CSS manipulation (MFSA 2014-75)

EPSS

Процентиль: 89%
0.04667
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.

nvd
почти 11 лет назад

Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.

debian
почти 11 лет назад

Heap-based buffer overflow in the nsTransformedTextRun function in Moz ...

github
больше 3 лет назад

Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.

oracle-oval
почти 11 лет назад

ELSA-2014-1635: firefox security update (CRITICAL)

EPSS

Процентиль: 89%
0.04667
Низкий

5.1 Medium

CVSS2