The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2918-1 | iceweasel security update |
Debian DSA |
DSA-2924-1 | icedove security update |
EUVD |
EUVD-2014-1600 | The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object. |
Ubuntu USN |
USN-2185-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-2189-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-06T09:42:36.208Z
Reserved: 2014-01-16T00:00:00
Link: CVE-2014-1524
No data.
Status : Deferred
Published: 2014-04-30T10:49:04.833
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-1524
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN