CVE-2014-1481
Published: 4 February 2014
Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(27.0+build1-0ubuntu0.12.04.1)
|
|
quantal |
Released
(27.0+build1-0ubuntu0.12.10.1)
|
|
saucy |
Released
(27.0+build1-0ubuntu0.13.10.1)
|
|
upstream |
Released
(27.0)
|
|
thunderbird Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(1:24.3.0+build2-0ubuntu0.12.04.1)
|
|
quantal |
Released
(1:24.3.0+build2-0ubuntu0.12.10.1)
|
|
saucy |
Released
(1:24.3.0+build2-0ubuntu0.13.10.1)
|
|
upstream |
Released
(24.3.0)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |