CVE-2014-1563

Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html Third Party Advisory
http://secunia.com/advisories/60148
http://secunia.com/advisories/61114
http://www.mozilla.org/security/announce/2014/mfsa2014-68.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html Third Party Advisory
http://www.securityfocus.com/bid/69523
http://www.securitytracker.com/id/1030793
http://www.securitytracker.com/id/1030794
https://bugzilla.mozilla.org/show_bug.cgi?id=1018524 Issue Tracking
https://security.gentoo.org/glsa/201504-01
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html Third Party Advisory
http://secunia.com/advisories/60148
http://secunia.com/advisories/61114
http://www.mozilla.org/security/announce/2014/mfsa2014-68.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html Third Party Advisory
http://www.securityfocus.com/bid/69523
http://www.securitytracker.com/id/1030793
http://www.securitytracker.com/id/1030794
https://bugzilla.mozilla.org/show_bug.cgi?id=1018524 Issue Tracking
https://security.gentoo.org/glsa/201504-01
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-09-03 10:55

Updated : 2025-04-12 10:46


NVD link : CVE-2014-1563

Mitre link : CVE-2014-1563

CVE.ORG link : CVE-2014-1563


JSON object : View

Products Affected

opensuse

  • opensuse
  • evergreen

oracle

  • solaris

mozilla

  • thunderbird
  • firefox
CWE
CWE-416

Use After Free