First published: Wed Sep 03 2014(Updated: )
The mozilla::dom::AudioEventTimeline function in the Web Audio API implementation in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 does not properly create audio timelines, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted API calls.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=31.1.0 | |
Mozilla Firefox | =30.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox ESR | =31.0 | |
Mozilla Thunderbird | =31.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1565 has a severity rating that indicates it could allow remote attackers to gain access to sensitive information.
To mitigate CVE-2014-1565, update to Mozilla Firefox version 32.0 or later, or Firefox ESR version 31.1 or later.
CVE-2014-1565 affects Mozilla Firefox versions before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1.
CVE-2014-1565 is caused by improper creation of audio timelines in the Web Audio API implementation.
Yes, CVE-2014-1565 can potentially lead to data breaches by allowing remote attackers to access sensitive information from process memory.