First published: Thu Dec 11 2014(Updated: )
Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=33.0 | |
Firefox ESR | <=31.2 | |
Mozilla SeaMonkey | <=2.30 | |
Thunderbird | <=31.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1592 is considered a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2014-1592, users should upgrade to Mozilla Firefox version 34.0 or later, or appropriate updated versions of affected Thunderbird, SeaMonkey, and Firefox ESR.
CVE-2014-1592 affects Mozilla Firefox versions before 34.0, Firefox ESR versions before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31.
Yes, CVE-2014-1592 can be exploited remotely by attackers who manipulate HTML5 documents.
CVE-2014-1592 is a use-after-free vulnerability that occurs in the nsHtml5TreeOperation function.