CVE-2014-1541 Affecting firefox package, versions <0:24.6.0-1.0.1.el7_0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE7-FIREFOX-2482785
- published 10 Apr 2022
- disclosed 11 Jun 2014
Introduced: 11 Jun 2014
CVE-2014-1541 Open this link in a new tabHow to fix?
Upgrade Oracle:7
firefox
to version 0:24.6.0-1.0.1.el7_0 or higher.
This issue was patched in ELSA-2014-0741
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream firefox
package and not the firefox
package as distributed by Oracle
.
See How to fix?
for Oracle:7
relevant fixed versions and status.
Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
References
- https://linux.oracle.com/cve/CVE-2014-1541.html
- https://linux.oracle.com/errata/ELSA-2014-0741.html
- https://linux.oracle.com/errata/ELSA-2014-0742.html
- http://linux.oracle.com/errata/ELSA-2014-0741.html
- http://linux.oracle.com/errata/ELSA-2014-0742.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2014-0741.html
- http://rhn.redhat.com/errata/RHSA-2014-0742.html
- http://secunia.com/advisories/59328
- http://secunia.com/advisories/59425
- http://secunia.com/advisories/59486
- http://www.debian.org/security/2014/dsa-2955
- http://www.debian.org/security/2014/dsa-2960
- http://www.mozilla.org/security/announce/2014/mfsa2014-52.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/67979
- http://www.securitytracker.com/id/1030386
- http://www.securitytracker.com/id/1030388
- http://www.ubuntu.com/usn/USN-2243-1
- http://www.ubuntu.com/usn/USN-2250-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1000185
- https://security.gentoo.org/glsa/201504-01
- http://secunia.com/advisories/58984
- http://secunia.com/advisories/59052
- http://secunia.com/advisories/59149
- http://secunia.com/advisories/59150
- http://secunia.com/advisories/59165
- http://secunia.com/advisories/59169
- http://secunia.com/advisories/59170
- http://secunia.com/advisories/59171
- http://secunia.com/advisories/59229
- http://secunia.com/advisories/59275
- http://secunia.com/advisories/59377
- http://secunia.com/advisories/59387
- http://secunia.com/advisories/59866