CVE-2014-1514

Priority
Medium
Description
vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x
before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not
validate the length of the destination array before a copy operation, which
allows remote attackers to execute arbitrary code or cause a denial of
service (out-of-bounds write and application crash) by triggering incorrect
use of the TypedArrayObject class.
References
Assigned-to
chrisccoulson
Package
Upstream:released (24.4.0)
Ubuntu 10.04 LTS (Lucid Lynx):ignored (reached end-of-life)
Ubuntu 12.04 LTS (Precise Pangolin):released (1:24.4.0+build1-0ubuntu0.12.04.1)
Ubuntu 12.10 (Quantal Quetzal):released (1:24.4.0+build1-0ubuntu0.12.10.1)
Ubuntu 13.10 (Saucy Salamander):released (1:24.4.0+build1-0ubuntu0.13.10.2)
Ubuntu 14.04 LTS (Trusty Tahr):released (1:24.4.0+build1-0ubuntu1)
Package
Upstream:released (28.0)
Ubuntu 10.04 LTS (Lucid Lynx):ignored (reached end-of-life)
Ubuntu 12.04 LTS (Precise Pangolin):released (28.0+build2-0ubuntu0.12.04.1)
Ubuntu 12.10 (Quantal Quetzal):released (28.0+build2-0ubuntu0.12.10.1)
Ubuntu 13.10 (Saucy Salamander):released (28.0+build2-0ubuntu0.13.10.1)
Ubuntu 14.04 LTS (Trusty Tahr):released (28.0+build2-0ubuntu1)
More Information

Valid XHTML 1.0 Strict

Updated: 2014-03-21 18:14:39 UTC (commit 7865)