First published: Wed Apr 30 2014(Updated: )
The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <29.0 | |
Mozilla Firefox ESR | >=24.0<24.5 | |
Mozilla SeaMonkey | <2.26 | |
Mozilla Thunderbird | <24.5 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Ubuntu Linux | =14.04 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =6.5 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =6.5 | |
redhat enterprise Linux server eus | =6.5 | |
redhat enterprise Linux server tus | =6.5 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
openSUSE | =11.4 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1529 has a medium severity rating, which means it poses a significant risk to affected systems.
To mitigate CVE-2014-1529, users should update to Mozilla Firefox version 29.0 or later, or the latest versions of affected applications.
CVE-2014-1529 affects Mozilla Firefox versions before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26.
Yes, specific versions of Ubuntu such as 12.04, 12.10, 13.10, and 14.04 may be vulnerable to CVE-2014-1529 if they are running the affected applications without patches.
CVE-2014-1529 allows remote attackers to bypass source-component restrictions and execute arbitrary JavaScript code in a privileged context.