First published: Wed Jun 11 2014(Updated: )
Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <=24.5 | |
Mozilla Thunderbird | =24.0 | |
Mozilla Thunderbird | =24.0.1 | |
Mozilla Thunderbird | =24.1 | |
Mozilla Thunderbird | =24.1.1 | |
Mozilla Thunderbird | =24.2 | |
Mozilla Thunderbird | =24.3 | |
Mozilla Thunderbird | =24.4 | |
Mozilla Firefox | <=29.0.1 | |
Mozilla Firefox ESR | =24.0 | |
Mozilla Firefox ESR | =24.0.1 | |
Mozilla Firefox ESR | =24.0.2 | |
Mozilla Firefox ESR | =24.1.0 | |
Mozilla Firefox ESR | =24.1.1 | |
Mozilla Firefox ESR | =24.2 | |
Mozilla Firefox ESR | =24.3 | |
Mozilla Firefox ESR | =24.4 | |
Mozilla Firefox ESR | =24.5 | |
Mozilla Firefox | =24.0 | |
Mozilla Firefox | =24.1.0 | |
Mozilla Firefox | =24.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1541 is classified as a critical vulnerability that can lead to remote code execution or denial of service.
To fix CVE-2014-1541, update Mozilla Firefox to version 30.0 or later, or Thunderbird and Firefox ESR to versions 24.6 or later.
CVE-2014-1541 affects Mozilla Firefox versions before 30.0, Thunderbird versions before 24.6, and Firefox ESR versions before 24.6.
CVE-2014-1541 can be exploited through crafted content that triggers the use-after-free vulnerability, potentially allowing arbitrary code execution.
There are no known workarounds for CVE-2014-1541; the recommended mitigation is to upgrade to the secure versions of the affected software.