First published: Wed Oct 15 2014(Updated: )
Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | =31.0 | |
Mozilla Thunderbird | =31.1.0 | |
Mozilla Firefox ESR | =31.0 | |
Mozilla Firefox ESR | =31.1.0 | |
Mozilla Firefox | <=32.0 | |
Mozilla Firefox | =30.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox | =31.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1576 has a medium severity rating due to its potential for remote code execution.
To fix CVE-2014-1576, update Mozilla Firefox to version 33.0 or later, or update Thunderbird to version 31.2 or later.
CVE-2014-1576 affects Mozilla Firefox versions prior to 33.0, Firefox ESR versions prior to 31.2, and Thunderbird versions prior to 31.2.
Yes, CVE-2014-1576 can be exploited via malicious Cascading Style Sheets (CSS) token sequences.
CVE-2014-1576 is a heap-based buffer overflow vulnerability.