CVE-2014-1513

Priority
Medium
Description
TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x
before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not
prevent a zero-length transition during use of an ArrayBuffer object, which
allows remote attackers to execute arbitrary code or cause a denial of
service (heap-based out-of-bounds write or read) via a crafted web site.
References
Assigned-to
chrisccoulson
Package
Upstream:released (24.4.0)
Ubuntu 10.04 LTS (Lucid Lynx):ignored (reached end-of-life)
Ubuntu 12.04 LTS (Precise Pangolin):released (1:24.4.0+build1-0ubuntu0.12.04.1)
Ubuntu 12.10 (Quantal Quetzal):released (1:24.4.0+build1-0ubuntu0.12.10.1)
Ubuntu 13.10 (Saucy Salamander):released (1:24.4.0+build1-0ubuntu0.13.10.2)
Ubuntu 14.04 LTS (Trusty Tahr):released (1:24.4.0+build1-0ubuntu1)
Package
Upstream:released (28.0)
Ubuntu 10.04 LTS (Lucid Lynx):ignored (reached end-of-life)
Ubuntu 12.04 LTS (Precise Pangolin):released (28.0+build2-0ubuntu0.12.04.1)
Ubuntu 12.10 (Quantal Quetzal):released (28.0+build2-0ubuntu0.12.10.1)
Ubuntu 13.10 (Saucy Salamander):released (28.0+build2-0ubuntu0.13.10.1)
Ubuntu 14.04 LTS (Trusty Tahr):released (28.0+build2-0ubuntu1)
More Information

Valid XHTML 1.0 Strict

Updated: 2014-03-21 18:14:39 UTC (commit 7865)