First published: Wed Sep 03 2014(Updated: )
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=31.1.0 | |
Mozilla Firefox | =30.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox ESR | =24.0 | |
Mozilla Firefox ESR | =24.0.1 | |
Mozilla Firefox ESR | =24.0.2 | |
Mozilla Firefox ESR | =24.1.0 | |
Mozilla Firefox ESR | =24.1.1 | |
Mozilla Firefox ESR | =24.2 | |
Mozilla Firefox ESR | =24.3 | |
Mozilla Firefox ESR | =24.4 | |
Mozilla Firefox ESR | =24.5 | |
Mozilla Firefox ESR | =24.6 | |
Mozilla Firefox ESR | =24.7 | |
Mozilla Firefox ESR | =31.0 | |
Mozilla Thunderbird | =24.0 | |
Mozilla Thunderbird | =24.0.1 | |
Mozilla Thunderbird | =24.1 | |
Mozilla Thunderbird | =24.1.1 | |
Mozilla Thunderbird | =24.2 | |
Mozilla Thunderbird | =24.3 | |
Mozilla Thunderbird | =24.4 | |
Mozilla Thunderbird | =24.5 | |
Mozilla Thunderbird | =24.6 | |
Mozilla Thunderbird | =24.7 | |
Mozilla Thunderbird | =31.0 | |
Mozilla Firefox | =24.0 | |
Mozilla Firefox | =24.1.0 | |
Mozilla Firefox | =24.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1567 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2014-1567, update Mozilla Firefox or Thunderbird to version 32.0 or later, or ensure you are using Firefox ESR 24.8 or Thunderbird 31.1.
CVE-2014-1567 affects Mozilla Firefox versions prior to 32.0, Firefox ESR versions before 24.8, and Thunderbird versions before 31.1.
CVE-2014-1567 can lead to arbitrary code execution, which may compromise user data and system integrity if successfully exploited.
There are no known workarounds for CVE-2014-1567; users are strongly encouraged to update their software to mitigate the vulnerability.