CVE-2014-1497
The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.
Published at
2014-03-19T10:55Z
3700 days ago
Modified
2020-08-06T20:45Z
1367 days ago
CWE-125
Problem type
Impact
- CVSS v3 vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Severity Score Vector
8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HReferences
GET https://vulnerabilitydata.com/api/details/CVE-2014-1497
{ "id": "CVE-2014-1497", "published_date": "2014-03-19T10:55Z", "last_modified_date": "2020-08-06T20:45Z", "assigner": "security@mozilla.org", "description": "The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.", "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=966311", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=966311", "refsource": "CONFIRM", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ] }, { "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-17.html", "name": "http://www.mozilla.org/security/announce/2014/mfsa2014-17.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.debian.org/security/2014/dsa-2881", "name": "DSA-2881", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html", "name": "RHSA-2014:0310", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html", "name": "RHSA-2014:0316", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html", "name": "openSUSE-SU-2014:0419", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html", "name": "SUSE-SU-2014:0418", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html", "name": "openSUSE-SU-2014:0448", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.ubuntu.com/usn/USN-2151-1", "name": "USN-2151-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html", "name": "openSUSE-SU-2014:0584", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/bid/66423", "name": "66423", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ] }, { "url": "https://security.gentoo.org/glsa/201504-01", "name": "GLSA-201504-01", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.debian.org/security/2014/dsa-2911", "name": "DSA-2911", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ] } ], "impact": { "baseMetricV3": { "cvssV3": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 }, "baseMetricV2": { "cvssV2": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } }, "problem_type": "CWE-125" }