CVE-2014-1557
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
23/07/2014
Last modified:
12/04/2025
Description
The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 30.0 (including) | |
cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox_esr:24.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* | 24.6 (including) | |
cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://linux.oracle.com/errata/ELSA-2014-0918.html
- http://secunia.com/advisories/59591
- http://secunia.com/advisories/59719
- http://secunia.com/advisories/59760
- http://secunia.com/advisories/60083
- http://secunia.com/advisories/60306
- http://secunia.com/advisories/60486
- http://secunia.com/advisories/60621
- http://secunia.com/advisories/60628
- http://www.debian.org/security/2014/dsa-2986
- http://www.debian.org/security/2014/dsa-2996
- http://www.mozilla.org/security/announce/2014/mfsa2014-64.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/68824
- http://www.securitytracker.com/id/1030619
- http://www.securitytracker.com/id/1030620
- https://bugzilla.mozilla.org/show_bug.cgi?id=913805
- https://security.gentoo.org/glsa/201504-01
- http://linux.oracle.com/errata/ELSA-2014-0918.html
- http://secunia.com/advisories/59591
- http://secunia.com/advisories/59719
- http://secunia.com/advisories/59760
- http://secunia.com/advisories/60083
- http://secunia.com/advisories/60306
- http://secunia.com/advisories/60486
- http://secunia.com/advisories/60621
- http://secunia.com/advisories/60628
- http://www.debian.org/security/2014/dsa-2986
- http://www.debian.org/security/2014/dsa-2996
- http://www.mozilla.org/security/announce/2014/mfsa2014-64.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/68824
- http://www.securitytracker.com/id/1030619
- http://www.securitytracker.com/id/1030620
- https://bugzilla.mozilla.org/show_bug.cgi?id=913805
- https://security.gentoo.org/glsa/201504-01