First published: Tue Jun 10 2014(Updated: )
Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a number of use-after-free and out of bounds read issues using the Address Sanitizer tool. These issues are potentially exploitable, allowing for remote code execution. In general these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts. External Reference: <a href="http://www.mozilla.org/security/announce/2014/mfsa2014-49.html">http://www.mozilla.org/security/announce/2014/mfsa2014-49.html</a> Acknowledgements: Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Abhishek Arya as the original reporter.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=29.0.1 | |
Mozilla Firefox ESR | =24.0 | |
Mozilla Firefox ESR | =24.0.1 | |
Mozilla Firefox ESR | =24.0.2 | |
Mozilla Firefox ESR | =24.1.0 | |
Mozilla Firefox ESR | =24.1.1 | |
Mozilla Firefox ESR | =24.2 | |
Mozilla Firefox ESR | =24.3 | |
Mozilla Firefox ESR | =24.4 | |
Mozilla Firefox ESR | =24.5 | |
Mozilla Thunderbird | <=24.5 | |
Mozilla Thunderbird | =24.0 | |
Mozilla Thunderbird | =24.0.1 | |
Mozilla Thunderbird | =24.1 | |
Mozilla Thunderbird | =24.1.1 | |
Mozilla Thunderbird | =24.2 | |
Mozilla Thunderbird | =24.3 | |
Mozilla Thunderbird | =24.4 | |
Mozilla Firefox | =24.0 | |
Mozilla Firefox | =24.1.0 | |
Mozilla Firefox | =24.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.