Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-1592

Опубликовано: 02 дек. 2014
Источник: redhat
CVSS2: 6.8

Описание

Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7thunderbirdAffected
Red Hat Enterprise Linux 5firefoxFixedRHSA-2014:191902.12.2014
Red Hat Enterprise Linux 5thunderbirdFixedRHSA-2014:192402.12.2014
Red Hat Enterprise Linux 6firefoxFixedRHSA-2014:191902.12.2014
Red Hat Enterprise Linux 6thunderbirdFixedRHSA-2014:192402.12.2014
Red Hat Enterprise Linux 7firefoxFixedRHSA-2014:191902.12.2014

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1169208Mozilla: Use-after-free during HTML5 parsing (MFSA 2014-87)

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.

nvd
больше 10 лет назад

Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.

debian
больше 10 лет назад

Use-after-free vulnerability in the nsHtml5TreeOperation function in x ...

github
больше 3 лет назад

Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.

oracle-oval
больше 10 лет назад

ELSA-2014-1924: thunderbird security update (IMPORTANT)

6.8 Medium

CVSS2