CVE-2014-1576

high

Description

Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.

References

https://security.gentoo.org/glsa/201504-01

https://bugzilla.mozilla.org/show_bug.cgi?id=1041512

https://advisories.mageia.org/MGASA-2014-0421.html

http://www.ubuntu.com/usn/USN-2373-1

http://www.ubuntu.com/usn/USN-2372-1

http://www.securitytracker.com/id/1031030

http://www.securitytracker.com/id/1031028

http://www.securityfocus.com/bid/70430

http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html

http://www.mozilla.org/security/announce/2014/mfsa2014-75.html

http://www.debian.org/security/2014/dsa-3061

http://www.debian.org/security/2014/dsa-3050

http://secunia.com/advisories/62023

http://secunia.com/advisories/62022

http://secunia.com/advisories/62021

http://secunia.com/advisories/61854

http://secunia.com/advisories/61387

http://rhn.redhat.com/errata/RHSA-2014-1635.html

http://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html

http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html

http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html

http://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html

http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html

http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html

http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html

Details

Source: Mitre, NVD

Published: 2014-10-15

Updated: 2016-12-24

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High