First published: Wed Jul 23 2014(Updated: )
Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=30.0 | |
Mozilla Firefox ESR | =24.0 | |
Mozilla Firefox ESR | =24.0.1 | |
Mozilla Firefox ESR | =24.0.2 | |
Mozilla Firefox ESR | =24.1.0 | |
Mozilla Firefox ESR | =24.1.1 | |
Mozilla Firefox ESR | =24.2 | |
Mozilla Firefox ESR | =24.3 | |
Mozilla Firefox ESR | =24.4 | |
Mozilla Firefox ESR | =24.5 | |
Mozilla Firefox ESR | =24.6 | |
Mozilla Thunderbird | <=24.6 | |
Mozilla Thunderbird | =24.0 | |
Mozilla Thunderbird | =24.0.1 | |
Mozilla Thunderbird | =24.1 | |
Mozilla Thunderbird | =24.1.1 | |
Mozilla Thunderbird | =24.2 | |
Mozilla Thunderbird | =24.3 | |
Mozilla Thunderbird | =24.4 | |
Mozilla Thunderbird | =24.5 | |
Mozilla Firefox | =24.0 | |
Mozilla Firefox | =24.1.0 | |
Mozilla Firefox | =24.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1555 is considered to have a high severity rating due to its potential for remote code execution.
To fix CVE-2014-1555, update Mozilla Firefox or Thunderbird to the latest version beyond those affected by this vulnerability.
CVE-2014-1555 affects Mozilla Firefox versions before 31.0, Firefox ESR versions before 24.7, and Thunderbird versions before 24.7.
Attackers can exploit CVE-2014-1555 to execute arbitrary code on the victim's system.
Yes, CVE-2014-1555 is a well-documented vulnerability reported in 2014 affecting multiple Mozilla applications.