First published: Wed Sep 03 2014(Updated: )
Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opensuse Evergreen | =11.4 | |
openSUSE openSUSE | =12.3 | |
openSUSE openSUSE | =13.1 | |
Oracle Solaris | =11.3 | |
Mozilla Firefox | <=31.1.0 | |
Mozilla Firefox | =30.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox ESR | =31.0 | |
Mozilla Thunderbird | =31.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.