First published: Wed Apr 30 2014(Updated: )
The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <29.0 | |
Firefox ESR | >=24.0<24.5 | |
Mozilla SeaMonkey | <2.26 | |
Thunderbird | <24.5 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.5 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Fedora | =19 | |
Red Hat Fedora | =20 | |
openSUSE | =11.4 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1529 has a medium severity rating, which means it poses a significant risk to affected systems.
To mitigate CVE-2014-1529, users should update to Mozilla Firefox version 29.0 or later, or the latest versions of affected applications.
CVE-2014-1529 affects Mozilla Firefox versions before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26.
Yes, specific versions of Ubuntu such as 12.04, 12.10, 13.10, and 14.04 may be vulnerable to CVE-2014-1529 if they are running the affected applications without patches.
CVE-2014-1529 allows remote attackers to bypass source-component restrictions and execute arbitrary JavaScript code in a privileged context.