Описание
Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | thunderbird | Affected | ||
Red Hat Enterprise Linux 6 | thunderbird | Affected | ||
Red Hat Enterprise Linux 5 | firefox | Fixed | RHSA-2014:1635 | 15.10.2014 |
Red Hat Enterprise Linux 6 | firefox | Fixed | RHSA-2014:1635 | 15.10.2014 |
Red Hat Enterprise Linux 7 | firefox | Fixed | RHSA-2014:1635 | 15.10.2014 |
Red Hat Enterprise Linux 7 | xulrunner | Fixed | RHSA-2014:1635 | 15.10.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.1 Medium
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
Heap-based buffer overflow in the nsTransformedTextRun function in Moz ...
Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
EPSS
5.1 Medium
CVSS2