First published: Wed Apr 30 2014(Updated: )
The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <29.0 | |
Mozilla SeaMonkey | <2.26 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 | |
Fedora | =19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1526 has been classified as a moderate severity vulnerability.
To fix CVE-2014-1526, upgrade Mozilla Firefox to version 29.0 or later and SeaMonkey to version 2.26 or later.
CVE-2014-1526 affects Mozilla Firefox versions prior to 29.0 and SeaMonkey versions prior to 2.26, as well as specific Ubuntu and openSUSE versions.
Yes, CVE-2014-1526 can be exploited by remote attackers through a crafted website that users visit on the debugger.
Exploiting CVE-2014-1526 allows attackers to bypass access restrictions, potentially leading to unauthorized operations on sensitive DOM objects.