First published: Wed Mar 19 2014(Updated: )
Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 might allow local users to gain privileges by modifying the extracted Mar contents during an update.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <28.0 | |
Firefox ESR | >=24.0<24.4 | |
Mozilla SeaMonkey | <2.25 | |
Thunderbird | <24.4 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp3 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
<28.0 | ||
>=24.0<24.4 | ||
<2.25 | ||
<24.4 | ||
=11.0-sp3 | ||
=11-sp3 | ||
=11-sp3 | ||
=11-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1496 is considered to have a medium severity level allowing local users to gain privileges.
To fix CVE-2014-1496, update Mozilla Firefox to version 28.0 or later, and update Thunderbird, SeaMonkey, and Firefox ESR to their respective patched versions.
CVE-2014-1496 affects users of Mozilla Firefox before version 28.0, Firefox ESR versions, Thunderbird before 24.4, and SeaMonkey before 2.25.
CVE-2014-1496 is a local privilege escalation vulnerability that can be exploited during the update process of affected software.
There are no known effective workarounds for CVE-2014-1496, and the best course of action is to apply the necessary software updates.