First published: Wed Jul 23 2014(Updated: )
Use-after-free vulnerability in the FontTableRec destructor in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 on Windows allows remote attackers to execute arbitrary code via crafted use of fonts in MathML content, leading to improper handling of a DirectWrite font-face object.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Firefox | <=30.0 | |
Firefox | =24.0 | |
Firefox | =24.1.0 | |
Firefox | =24.1.1 | |
Firefox ESR | =24.0.1 | |
Firefox ESR | =24.0.2 | |
Firefox ESR | =24.2 | |
Firefox ESR | =24.3 | |
Firefox ESR | =24.4 | |
Firefox ESR | =24.5 | |
Firefox ESR | =24.6 | |
Thunderbird | <=24.6 | |
Thunderbird | =24.0 | |
Thunderbird | =24.0.1 | |
Thunderbird | =24.1 | |
Thunderbird | =24.1.1 | |
Thunderbird | =24.2 | |
Thunderbird | =24.3 | |
Thunderbird | =24.4 | |
Thunderbird | =24.5 | |
Microsoft Windows | ||
Firefox | <=30.0 | |
Firefox ESR | =24.0 | |
Firefox ESR | =24.0.1 | |
Firefox ESR | =24.0.2 | |
Firefox ESR | =24.1.0 | |
Firefox ESR | =24.1.1 | |
Firefox ESR | =24.2 | |
Firefox ESR | =24.3 | |
Firefox ESR | =24.4 | |
Firefox ESR | =24.5 | |
Firefox ESR | =24.6 | |
Thunderbird | <=24.6 | |
Thunderbird | =24.0 | |
Thunderbird | =24.0.1 | |
Thunderbird | =24.1 | |
Thunderbird | =24.1.1 | |
Thunderbird | =24.2 | |
Thunderbird | =24.3 | |
Thunderbird | =24.4 | |
Thunderbird | =24.5 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1551 is rated as a critical severity vulnerability due to its potential to execute arbitrary code remotely.
To fix CVE-2014-1551, update Mozilla Firefox to version 31.0 or later, and upgrade Thunderbird to version 24.7 or later.
CVE-2014-1551 affects Mozilla Firefox versions before 31.0, Firefox ESR versions 24.x before 24.7, and Thunderbird versions before 24.7 on Windows.
Yes, CVE-2014-1551 can be exploited by remote attackers via crafted use of fonts within MathML content.
There are no official workarounds for CVE-2014-1551, so updating to the latest version is strongly recommended.