First published: Wed Sep 03 2014(Updated: )
Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE Evergreen | =11.4 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Oracle Solaris SPARC | =11.3 | |
Mozilla Firefox | <=31.1.0 | |
Mozilla Firefox | =30.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Thunderbird | =31.0 | |
Mozilla Firefox ESR | =31.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1563 has a High severity rating due to its ability to allow remote code execution and denial of service.
To fix CVE-2014-1563, update Mozilla Firefox to version 32.0 or later, or upgrade Firefox ESR to version 31.1 or later.
CVE-2014-1563 affects Mozilla Firefox versions prior to 32.0, Firefox ESR versions before 31.1, and Thunderbird versions before 31.1.
Yes, CVE-2014-1563 can be exploited remotely through specially crafted SVG animations.
The impact of CVE-2014-1563 includes possible arbitrary code execution and heap memory corruption leading to a denial of service.