First published: Thu Dec 11 2014(Updated: )
Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=33.0 | |
Firefox ESR | <=31.2 | |
Mozilla SeaMonkey | <=2.30 | |
Thunderbird | <=31.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1593 is considered a high-severity vulnerability due to the potential for remote code execution.
CVE-2014-1593 affects Mozilla Firefox versions prior to 34.0, Firefox ESR versions before 31.3, Thunderbird versions before 31.3, and SeaMonkey versions before 2.31.
To fix CVE-2014-1593, update your affected software to the latest version provided by Mozilla.
Yes, CVE-2014-1593 can be exploited remotely by attackers through crafted media content.
CVE-2014-1593 is a stack-based buffer overflow vulnerability.