First published: Wed Oct 15 2014(Updated: )
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | =31.0 | |
Thunderbird | =31.1.0 | |
Firefox | =31.0 | |
Firefox | =31.1.0 | |
Firefox | <=32.0 | |
Firefox | =30.0 | |
Firefox ESR | =31.0 | |
Firefox ESR | =31.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1581 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2014-1581, update Mozilla Firefox to version 33.0 or later and Thunderbird to version 31.2 or later.
CVE-2014-1581 affects Mozilla Firefox versions prior to 33.0, Firefox ESR versions prior to 31.2, and Thunderbird versions prior to 31.2.
CVE-2014-1581 is identified as a use-after-free vulnerability.
Yes, CVE-2014-1581 can be exploited remotely by attackers through specially crafted text.