Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-1512

Опубликовано: 19 мар. 2014
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 10

Описание

Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.

РелизСтатусПримечание
devel

released

28.0+build2-0ubuntu1
lucid

ignored

end of life
precise

released

28.0+build2-0ubuntu0.12.04.1
quantal

released

28.0+build2-0ubuntu0.12.10.1
saucy

released

28.0+build2-0ubuntu0.13.10.1
upstream

released

28.0

Показывать по

РелизСтатусПримечание
devel

released

1:24.4.0+build1-0ubuntu1
lucid

ignored

end of life
precise

released

1:24.4.0+build1-0ubuntu0.12.04.1
quantal

released

1:24.4.0+build1-0ubuntu0.12.10.1
saucy

released

1:24.4.0+build1-0ubuntu0.13.10.2
upstream

released

24.4.0

Показывать по

EPSS

Процентиль: 95%
0.1791
Средний

10 Critical

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.

nvd
больше 11 лет назад

Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.

debian
больше 11 лет назад

Use-after-free vulnerability in the TypeObject class in the JavaScript ...

github
около 3 лет назад

Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.

fstec
больше 11 лет назад

Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 95%
0.1791
Средний

10 Critical

CVSS2