First published: Thu Feb 06 2014(Updated: )
Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information by using an IFRAME element in conjunction with certain timing measurements involving the document.caretPositionFromPoint and document.elementFromPoint functions.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =11.3 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Mozilla Firefox | <27.0 | |
Mozilla SeaMonkey | <2.24 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp3 | |
openSUSE | =11.4 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
suse linux enterprise server vmware | =11-sp3 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1483 is considered a medium severity vulnerability as it allows attackers to bypass the Same Origin Policy and access sensitive information.
To fix CVE-2014-1483, users should update Mozilla Firefox and SeaMonkey to versions 27.0 and 2.24 or later, respectively.
CVE-2014-1483 affects Mozilla Firefox versions prior to 27.0 and SeaMonkey versions prior to 2.24, along with certain versions of Ubuntu and openSUSE.
Yes, CVE-2014-1483 can be exploited remotely, allowing attackers to leverage the vulnerability via crafted web content.
The primary impact of CVE-2014-1483 is the potential exposure of sensitive information due to the bypass of the Same Origin Policy.