First published: Wed Dec 11 2013(Updated: )
Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <26.0 | |
Mozilla SeaMonkey | <2.23 | |
Fedora | =19 | |
Fedora | =20 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.5 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
SUSE Linux | =12.2 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-5614 is classified as moderate, indicating a potential for exploitation that could lead to a security issue.
To fix CVE-2013-5614, you should update your Mozilla Firefox or SeaMonkey to version 26.0 or 2.23, respectively.
CVE-2013-5614 affects Mozilla Firefox versions prior to 26.0 and SeaMonkey versions prior to 2.23.
CVE-2013-5614 allows remote attackers to bypass intended sandbox restrictions, potentially leading to unauthorized access to contained resources.
Using affected versions of Firefox or SeaMonkey poses security risks, so it is highly recommended to upgrade to secure versions.