First published: Wed Apr 30 2014(Updated: )
The mozilla::dom::TextTrack::AddCue function in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 does not properly perform garbage collection for Text Track Manager variables, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) via a crafted VIDEO element in an HTML document.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <29.0 | |
Mozilla SeaMonkey | <2.26 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Ubuntu Linux | =14.04 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Fedoraproject Fedora | =19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1525 has a high severity rating, allowing remote attackers to execute arbitrary code or cause a denial of service.
To fix CVE-2014-1525, upgrade Mozilla Firefox to version 29.0 or later, or SeaMonkey to version 2.26 or later.
CVE-2014-1525 affects Mozilla Firefox versions before 29.0 and SeaMonkey versions before 2.26, along with certain versions of Ubuntu and openSUSE.
CVE-2014-1525 can be exploited to execute arbitrary code or lead to denial of service due to use-after-free and improper memory management.
There are no specific workarounds for CVE-2014-1525; updating to the latest software version is the recommended action.