First published: Thu Feb 06 2014(Updated: )
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the MPostWriteBarrier class in js/src/jit/MIR.h and stack alignment in js/src/jit/AsmJS.cpp in OdinMonkey, and unknown other vectors.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <27.0 | |
Mozilla SeaMonkey | <2.24 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
openSUSE | =11.4 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1478 has a high severity due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2014-1478, update Mozilla Firefox to version 27.0 or later and SeaMonkey to version 2.24 or later.
CVE-2014-1478 affects Mozilla Firefox versions before 27.0 and SeaMonkey versions before 2.24, along with specific versions of Ubuntu and openSUSE.
Yes, CVE-2014-1478 can be exploited remotely, allowing attackers to cause application crashes or execute arbitrary code.
There are no recommended workarounds for CVE-2014-1478; the only mitigation is to update to secure versions of the affected software.